نتایج جستجو
Data-Driven Security: Analysis, Visualization and Dashboards
Jay Jacobs, Bob Rudis, 2014
Data-Driven Security: Analysis, Visualization and Dashboards
Jay Jacobs, Bob Rudis, 2014
Missile Defences and Asian-Pacific Security
Micheal J. Mazarr (auth.), 1989
Information Theoretic Security: Second International Conference, ICITS 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers
Alexandre Pinto, André Souto, Armando Matos, Luís Antunes (auth.), Yvo Desmedt (eds.), 2009
Information Theoretic Security: Second International Conference, ICITS 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers
Alexandre Pinto, André Souto, Armando Matos, Luís Antunes (auth.), Yvo Desmedt (eds.), 2009
Information Theoretic Security: Second International Conference, ICITS 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers
Alexandre Pinto, André Souto, Armando Matos, Luís Antunes (auth.), Yvo Desmedt (eds.), 2009
Biosecurity challenges of the global expansion of high-containment biological laboratories
Alison K Hottes; Ben Rusek; Frances Ellen Sharples; National Academy of Sciences (U.S.). Committee on International Security and Arms Control.; National Academy of Sciences (U.S.). Committee on Anticipating Biosecurity Challenges of the Global Expansion of High-Containment Biological Laboratories, 2012
Jonathan Dean: Pioneer in Détente in Europe, Global Cooperative Security, Arms Control and Disarmament
Hans Günter Brauch, Teri Grimwood (eds.), 2014
Postinternationalism and Small Arms Control : Theory, Politics, Security
Damien Rogers, 2009
State Control over Private Military and Security Companies in Armed Conflict
Hannah Tonkin, 2011
Technical Issues Related to the Comprehensive Nuclear Test Ban Treaty
Committee on Technical Issues Related to Ratification of the Comprehensive Nuclear Test Ban Treaty, Committee on International Security and Arms Control, National Academy of Sciences, 2002
Technical Issues Related to the Comprehensive Nuclear Test Ban Treaty
Committee on Technical Issues Related to Ratification of the Comprehensive Nuclear Test Ban Treaty, Committee on International Security and Arms Control, National Academy of Sciences, 2002
The Spent-Fuel Standard for Disposition of Excess Weapon Plutonium
Panel to Review the Spent-Fuel Standard for Disposition of Excess Weapon Plutonium, Committee on International Security and Arms Control, National Academy of Sciences, 2000
Information Assurance in Computer Networks: Methods, Models and Architectures for Network Security International Workshop MMM-ACNS 2001 St. Petersburg, Russia, May 21–23, 2001 Proceedings
Dipankar Dasgupta, Fabio A. Gonzalez (auth.), Vladimir I. Gorodetski, Victor A. Skormin, Leonard J. Popyack (eds.), 2001
Information Assurance in Computer Networks: Methods, Models and Architectures for Network Security International Workshop MMM-ACNS 2001 St. Petersburg, Russia, May 21–23, 2001 Proceedings
Dipankar Dasgupta, Fabio A. Gonzalez (auth.), Vladimir I. Gorodetski, Victor A. Skormin, Leonard J. Popyack (eds.), 2001
Quality of Service in Heterogeneous Networks: 6th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2009 and 3rd International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications, AAA-IDEA 2009, Las Palmas, Gran Canaria, November 23-25, 2009 Proceedings
José Ma Saldaña, José I. Aznar, Eduardo Viruete, Julián Fernández-Navajas, José Ruiz (auth.), Novella Bartolini, Sotiris Nikoletseas, Prasun Sinha, Valeria Cardellini, Anirban Mahanti (eds.), 2009
RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations (Wireless Networks and Mobile Communications)
Yan Zhang, Laurence T. Yang, Jiming Chen, 2009
Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications
Yan Zhang, Laurence T. Yang, Jianhua Ma, 2008
Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications
Yan Zhang, Laurence T. Yang, Jianhua Ma, 2008
Body of Secrets: Anatomy of the Ultra-Secret National Security Agency
James Bamford, 2001
Cyber-War: The Anatomy of the global Security Threat
Julian Richards (auth.), 2014
