نتایج جستجو
Information security risk management for ISO 27001/ISO 27002
Alan Calder, 2019
France and the New Imperialism: Security Policy in Sub-Saharan Africa
Bruno Charbonneau, 2008
New Directions in Japan’s Security: Non-U.S. Centric Evolution
Paul Midford, Wilhelm Vosse, 2020
Women, Peace and Security in Myanmar: Between Feminism and Ethnopolitics
Åshild Kolås, 2019
Security of payment in New South Wales and Victoria
Jeffrey Wilson, 2014
Security of Payments in the Australian Building & Construction Industry.
Marcus Jacobs QC, 2016
Handbook of Research on Globalized Agricultural Trade and New Challenges for Food Security
Vasilii Erokhin, Tianming Gao, 2020
Africa After the Cold War: The Changing Perspectives on Security
Adebayo Oyebade; Abiodun Alao; Victor Oguejiofor Okafor; Sheriffdeen A. Tella; Amadu Sesay; Funmi Olonisakin; Ayele Bekerie, 1998
Frontiers in Hardware Security and Trust: Theory, design and practice (Materials, Circuits and Devices)
Chip Hong Chang (editor), Yuan Cao (editor), 2020
Exploring Peace Formation: Security and Justice in Post-colonial States
Kwesi Aning, Volker Boege, M Anne Brown, Charles T Hunt, 2018
Indian Identity Narratives and the Politics of Security
Gitika Commuri, 2010
Network Security Foundations: Technology Fundamentals for IT Success
Matthew Strebe, 2004
Protecting Games: A Security Handbook for Game Developers and Publishers
Steven Davis, 2009
Managing Information Security
John R. Vacca (editor), 2013
The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues
Ryan Ko, Raymond Choo, 2015
