نتایج جستجو
Internet of Things: Enabling Technologies, Security and Social Implications (Services and Business Process Reengineering)
Santosh Kumar Pani (editor), Manjusha Pandey (editor), 2021
Network Security And Cyber Defense (CNSS)
Singh, Gurpej, 2021
The Next Era in Hardware Security: A Perspective on Emerging Technologies for Secure Electronics
Nikhil Rangarajan, Satwik Patnaik, Johann Knechtel, Shaloo Rakheja, Ozgur Sinanoglu, 2021
The Next Era in Hardware Security: A Perspective on Emerging Technologies for Secure Electronics
Nikhil Rangarajan, Satwik Patnaik, Johann Knechtel, Shaloo Rakheja, Ozgur Sinanoglu, 2021
Enterprise Networking, Security, and Automation Companion Guide (CCNAv7)
Cisco Networking Academy, 2020
The Transformation of Security in the Asia/Pacific Region
Desmond Ball, 1996
solution manual cryptography and network security
William Stallings, 2006
The InfoSec Handbook: An Introduction to Information Security
Umesh Hodeghatta Rao, Umesha Nayak (auth.), 2014
Platform Embedded Security Technology Revealed
Xiaoyu Ruan (auth.), 2014
Privacy vs. Security
Sophie Stalla-Bourdillon, Joshua Phillips, Mark D. Ryan (auth.), 2014
Feminist Security Studies: A Narrative Approach
Annick T. R. Wibben, 2010
Transforming Security: A New Balance-of-Power Doctrine
Ursula Werther-Pietsch, 2021
Transforming Security: A New Balance-of-Power Doctrine
Ursula Werther-Pietsch, 2021
GURPS 4th edition. Transhuman Space: Personnel Files 4 – Martingale Security
Phil Masters, 2009
Building in Security at Agile Speed
James Ransome, Brook Schoenfield, 2021
Advanced Computing and Systems for Security: Volume 13
Rituparna Chaki, Nabendu Chaki, Agostino Cortesi, Khalid Saeed, 2021
Advanced Computing and Systems for Security: Volume 13
Rituparna Chaki, Nabendu Chaki, Agostino Cortesi, Khalid Saeed, 2021
From Family to Police Force: Security and Belonging on a South Asian Border
Farhana Ibrahim, 2021
Security, Society and the State in the Caucasus
Kevork Oskanian (editor), Derek Averre (editor), 2018
U.S. Security Cooperation with Africa: Political and Policy Challenges
Robert J. Griffiths, 2016
The InfoSec Handbook: An Introduction to Information Security
Umesh Hodeghatta Rao, Umesha Nayak, 2014
Perimeter Security Sensor Technologies Handbook
National Criminal Justice Reference Service, NCJRS, 1998
