نتایج جستجو
CompTIA Security+ Certification Study Guide, Third Edition: Exam SY0-201 3E
Ido Dubrawsky, Jeremy Faircloth, 2009
Eleventh Hour Security+: Exam SY0-201 Study Guide
Ido Dubrawsky, 2009
Security+
Ido Dubrawsky (Auth.), 2007
Environmental Security and Public Safety: Problems and Needs in Conversion Policy and Research after 15 Years of Conversion in Central and Eastern Europe
Alexander Döring Dipl. Eng. (auth.), Wolfgang Spyra, Michael Katzsch (eds.), 2007
Communications and Multimedia Security. Advanced Techniques for Network and Data Protection: 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003. Proceedings
Alwyn Goh, David C. L. Ngo (auth.), Antonio Lioy, Daniele Mazzocchi (eds.), 2003
Communications and Multimedia Security. Advanced Techniques for Network and Data Protection: 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003. Proceedings
Alwyn Goh, David C. L. Ngo (auth.), Antonio Lioy, Daniele Mazzocchi (eds.), 2003
Computational Intelligence in Information Assurance and Security
E. C. Laskari, G. C. Meletiou (auth.), Nadia Nedjah, Ajith Abraham, Luiza de Macedo Mourelle (eds.), 2007
Computational Social Networks: Security and Privacy
Mostafa Salama, Mrutyunjaya Panda, Yomna Elbarawy, Aboul Ella Hassanien, Ajith Abraham (auth.), Ajith Abraham (eds.), 2012
Cryptography & Network Security (McGraw-Hill Forouzan Networking)
Behrouz Forouzan, 2007
Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification: First International Conference, RSSRail 2016, Paris, France, June 28-30, 2016, Proceedings
Thierry Lecomte, Ralf Pinger, Alexander Romanovsky (eds.), 2016
American Biodefense: How Dangerous Ideas about Biological Weapons Shape National Security
Frank L. Smith III, 2014
Network Security with OpenSSL
John Viega, Matt Messier, Pravir Chandra, 2002
Network Security with OpenSSL
John Viega, Matt Messier, Pravir Chandra, 2002
Network Security with OpenSSL
John Viega, Matt Messier, Pravir Chandra, 2002
Enterprise Mac Security: Mac OS X Snow Leopard
Charles Edge, William Barker, Beau Hunter, Gene Sullivan, 2010
Enterprise Mac Security: Mac OS X Snow Leopard
Charles Edge, William Barker, Beau Hunter, Gene Sullivan (auth.), 2010
Enterprise Mac Security: Mac OS X Snow Leopard, 2nd Edition
Charles Edge, William Barker, Beau Hunter, Gene Sullivan, 2010
Security Technology: International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings
Ju-Sung Kang, Dowon Hong (auth.), Tai-hoon Kim, Hojjat Adeli, Wai-chi Fang, Javier García Villalba, Kirk P. Arnett, Muhammad Khurram Khan (eds.), 2011
Computer Safety, Reliability, and Security: 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007. Proceedings
Willem Ridderhof, Hans-Gerhard Gross, Heiko Doerr (auth.), Francesca Saglietti, Norbert Oster (eds.), 2007
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice)
Tim Mather, Subra Kumaraswamy, Shahed Latif, 2009
ITF Round Tables Terrorism and International Transport: Towards Risk-based Security Policy
OECD Organisation for Economic Co-operation and Development, 2009
A Military History of Modern Spain: From the Napoleonic Era to the International War on Terror (Praeger Security International)
Wayne H. Bowen, José E. Alvarez, 2007
Accountability and Security in the Cloud: First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6, 2014, Revised Selected Papers and Lectures
Massimo Felici, Carmen Fernández-Gago (eds.), 2015
