نتایج جستجو
Mobile Application Development, Usability, and Security
Sougata Mukherjea, 2016
The InfoSec Handbook: An Introduction to Information Security
Umesha Nayak, Umesh Rao, 2014
CCNP Security SISAS 300-208 Official Cert Guide
Aaron Woland, Kevin Redmon, 2015
CompTIA Security+ SY0-501 Cert Guide
David L. Prowse, 2017
Research Methods in Critical Security Studies: An Introduction
Mark B. Salter, Can E. Mutlu, 2012
A Human Readable Guide to Cyber Security
Christian, Dane, 2015
Rising Titans, Falling Giants: How Great Powers Exploit Power Shifts (Cornell Studies in Security Affairs)
Joshua R. Itzkowitz Shifrinson, 2018
International Security and Peacebuilding: Africa, the Middle East, and Europe
Abu Bakarr Bah, 2017
Group Policy: Fundamentals, Security, and the Managed Desktop
Jeremy Moskowitz, 2015
IT Convergence and Security 2017
Kuinam J. Kim, Hyuncheol Kim, Nakhoon Baek (eds.), 2017
Expert-in-the-Loop Supervised Learning for Computer Security Detection Systems
Anaël Beaugnon, 2018
The Truth of the Russian Revolution: The Memoirs of the Tsar’s Chief of Security and His Wife
Konstantin Ivanovich Globachev; Sofia Nikolaevna Globacheva; Vladimir G Marinich, 2017
Network Security Through Data Analysis: From Data to Action
Michael Collins, 2017
Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java
David Coffin [David Coffin], 2011
Bodies as Evidence: Security, Knowledge, and Power (Global Insecurities)
Mark Maguire, Ursula Rao, Nils Zurawski, 2018
Computer Security Principles
Ricky Barnes, 2018
