نتایج جستجو
RED HAT LINUX SECURITY AND OPTIMIZATION HUNGRY MINDS =Red Hat Linux Security And Optimization
Mohammed J. Kabir, 2001
Windows Server 2012 Security from End to Edge and Beyond. Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions
Thomas W. Shinder, Yuri Diogenes, 2013
Climate Change and Security: A Gathering Storm of Global Challenges (Security and the Environment)
Christian Webersik, 2010
SDN and NFV Security: Security Analysis of Software-Defined Networking and Network Function Virtualization
Rahamatullah Khondoker (eds.), 2018
Pro Azure Governance and Security: A Comprehensive Guide to Azure Policy, Blueprints, Security Center, and Sentinel
Peter De Tender, David Rendon, Samuel Erskine, 2019
Handbook of Research on Machine and Deep Learning Applications for Cyber Security (Advances in Information Security, Privacy, and Ethics)
Padmavathi Ganapathi (editor), D. Shanmugapriya (editor), 2020
Exploring Security in Software Architecture and Design (Advances in Information Security, Privacy, and Ethics)
Michael Felderer (editor), Riccardo Scandariato (editor), 2018
