نتایج جستجو
EU-US Cooperation on Internal Security: Building a Transatlantic Regime
Dimitrios Anagnostakis, 2017
Security, Identity, and British Counterterrorism Policy
Kathryn Marie Fisher (auth.), 2015
Little Book of Trauma Healing: When Violence Striked And Community Security Is Threatened
Carolyn P. Yoder, 2005
Practical Cloud Security
Chris Dotson, March 2019
How Safe Are We?: Homeland Security Since 9/11
Janet Napolitano; Karen Breslau, 2019
Internet of Things Security and Data Protection
Ziegler, Sébastien, 2019
Internet of Things Security and Data Protection
Ziegler, Sébastien, 2019
EU Security Policy and Crisis Management: A Quest for Coherence
Nicole Koenig, 2016
EU Security Policy and Crisis Management: A Quest for Coherence
Nicole Koenig, 2016
RFID Security. A Lightweight Paradigm
Ahmed Khattab, Zahra Jeddi, Esmaeil Amini, Magdy Bayoumi, 2017
Different Faces of Security From Knowledge to Management
Konrad Raczkowski, Walter Kegö, Marian Żuber
Hacklog Volume 1 Anonymity: IT Security & Ethical Hacking Handbook
Stefano Novelli, Marco Stefano Doria, Marco Silvestri, 2019
The society of captives: A study of a maximum security prison
Gresham M. Sykes, 1958/1974
Security: A New Framework For Analysis
Barry Buzan, Ole Wæver and Jaap De Wilde, 1998
Network Scanning Cookbook Practical network security using Nmap and Nessus 7
Sairam Jetty, 2018
(ISC)² CISSP: certified information systems security professional: official practice tests
Chapple, Mike; Seidl, David, 2018
(ISC)² CISSP: certified information systems security professional: official practice tests
Chapple, Mike; Seidl, David, 2018
(ISC)² CISSP certified information systems security professional: official study guide
Chapple, Mike; Gibson, Darril; Stewart, James Michael, 2018
(ISC)² SSCP systems security certified practitioner : official practice tests
Chapple, Mike; Seidl, David, 2019
