نتایج جستجو
Security and Defensive Democracy in Israel: A Critical Approach to Political Discourse
Sharon Weinblum, 2015
Security Analysis
Benjamin Graham; David L. Dodd; James Grant; Warren Buffett, 2008
Wireless Network Security A Beginner’s Guide
Tyler Wrightson
Professional practice in crime prevention and security management
Prenzler, Tim, 2014
Fixing the Facts: National Security and the Politics of Intelligence
Joshua Rovner, 2011
National Security Cinema: The Shocking New Evidence of Government Control in Hollywood
Matthew Alford; Tom Secker, 2017
The Art Of War For Computer Security
Tom Madsen, 2019
Hardware IP Security and Trust
Prabhat Mishra, Swarup Bhunia, Mark Tehranipoor (eds.), 2017
Network Security Assessment: Know Your Network
Chris McNab, 2016
Biofuels, Bioenergy and Food Security: Technology, Institutions and Policies
Deepayan Debnath (Editor), Suresh Chandra Babu (Editor), 2019
CWSP Certified Wireless Security Professional Study Guide: Exam CWSP-205
David D. Coleman, David A. Westcott, Bryan E. Harkins, 2016
CompTIA Security+ (Exam SY0-401) Exam Guide
Wm. Arthur Conklin, Greg White, 2015
Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices
Sajay Rai, Philip Chukwuma, Richard Cozart, 2016
Practical Information Security Management: A Complete Guide to Planning and Implementation
Tony Campbell (auth.), 2016
NTP Security: A Quick-Start Guide
Allan Liska (auth.), 2016
Home Security Projects for Arduino
Tim Rustige, 2015
Attachment Theory: Working Towards Learned Security
Rhona M. Fear, 2016
Citizenship and Security: the constitution of political being
Xavier Guillaume; Jef Huysmans, 2013
iOS Penetration Testing A Definitive Guide to iOS Security
Kunal Relan, 2017
Nordic nonalignment/neutrality policies in the 1990s: implications for U.S. security
Stephen Paul Recca, Dec 1990
