نتایج جستجو
Emerging security algorithms and techniques
Ahmad, Khaleel; Doja, M. N.; Singh, Manu; Udzir, Nur Izura, 2019
Hacking exposed: bnetwork security secrets and solutions
Kurtz, George; McClure, Stuart; Scambray, Joel, 2001
Hacknotes web security portable reference
Shema, Mike, 2003
Big Data: Storage, Sharing, and Security
Fei Hu, 2016
Information Security Policies, Procedures, and Standards: A Practitioner’s Reference
Douglas J. Landoll, 2016
On Privacy-Preserving Protocols for Smart Metering Systems: Security and Privacy in Smart Grids
Fábio Borges de Oliveira (auth.), 2017
Global Soil Security
Damien J. Field, Cristine L.S. Morgan, Alex B. McBratney (eds.), 2017
Security Challenges and Approaches in Internet of Things
Sridipta Misra, Muthucumaru Maheswaran, Salman Hashmi (auth.), 2017
Information Fusion for Cyber-Security Analytics
Izzat M Alsmadi, George Karabatis, Ahmed Aleroud (eds.), 2017
Multimedia Forensics and Security: Foundations, Innovations, and Applications
Aboul Ella Hassanien, Mohamed Mostafa Fouad, Azizah Abdul Manaf, Mazdak Zamani, Rabiah Ahmad, Janusz Kacprzyk (eds.), 2017
Vehicular Cyber Physical Systems: Adaptive Connectivity and Security
Danda B. Rawat, Chandra Bajracharya (auth.), 2017
Intelligent Techniques in Signal Processing for Multimedia Security
Nilanjan Dey, V. Santhi (eds.), 2017
Smart Grids: Security and Privacy Issues
Kianoosh G. Boroojeni, M. Hadi Amini, S. S. Iyengar (auth.), 2017
RFID Security: A Lightweight Paradigm
Ahmed Khattab, Zahra Jeddi, Esmaeil Amini, Magdy Bayoumi (auth.), 2017
The Politics of Space Security: Strategic Restraint and the Pursuit of National Interests
James Clay Moltz, 2011
China and intervention at the UN Security Council : reconciling status
Fung, Courtney J., 2019
Strategy and Security in the Asia-Pacific
Robert Ayson, Desmond Ball, 2006
The Dollar and National Security: The Monetary Component of Hard Power
Paul Viotti, 2014
The Dollar and National Security: The Monetary Component of Hard Power
Paul Viotti, 2014
Security and Privacy for Big Data, Cloud Computing and Applications
Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa, 2019
5G Explained: Security and Deployment of Advanced Mobile Communications
Jyrki T. J. Penttinen, 2019
