نتایج جستجو
Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial Lectures
Santiago Escobar, Catherine Meadows, José Meseguer (auth.), Alessandro Aldini, Gilles Barthe, Roberto Gorrieri (eds.), 2009
Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial Lectures
Santiago Escobar, Catherine Meadows, José Meseguer (auth.), Alessandro Aldini, Gilles Barthe, Roberto Gorrieri (eds.), 2009
Black Hat Physical Device Security: Exploiting Hardware and Software
Drew Miller, Rob Shein, Michael Bednarczyk, Black Hat Services, 2005
Secure Internet Programming: Security Issues for Mobile and Distributed Objects
Vipin Swarup, Javier Thayer Fábrega (auth.), Jan Vitek, Christian D. Jensen (eds.), 1999
Security and Trust Management: 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings
Sjouke Mauw, Christian Damsgaard Jensen (eds.), 2014
Trust Management II: Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway
Marcin Czenko, Jeroen Doumen, Sandro Etalle (auth.), Yücel Karabulut, John Mitchell, Peter Herrmann, Christian Damsgaard Jensen (eds.), 2008
Certification and Security in E-Services: From E-Government to E-Business
Maurizio Talamo (auth.), Enrico Nardelli, Sabina Posadziejewski, Maurizio Talamo (eds.), 2003
Basic Security Testing with Kali Linux
Daniel W. Dieterle, 2013
Kali Linux: Assuring Security By Penetration Testing
Tedi Heriyanto, Lee Allen, Shakeel Ali, 2014
Kali Linux: Assuring Security by Penetration Testing
Tedi Heriyanto, Lee Allen, Shakeel Ali, 2014
Black Hat Physical Device Security
Drew Miller, 2004
Black Hat physical device security: exploiting hardware and software
Drew Miller, 2005
Black Hat Physical Device Security: Exploiting Hardware and Software
Drew Miller, 2005
Black Hat Physical Device Security: Exploiting Hardware and Software
Drew Miller, 2005
Document Security: Protecting Physical and Electronic Content
Ronald L. Mendell, 2007
Document Security: Protecting Physical and Electronic Content
Ronald L. Mendell, 2007
Effective Physical Security
Lawrence Fennelly (Eds.), 2012
Effective Physical Security, Third Edition
Lawrence Fennelly, 2003
Effective Physical Security. Design, Equipment, and Operations
Lawrence J. Fennelly (Eds.), 1992
Military Handbook Design Guidelines for Physical Security of Facilities
DEPARTMENT OF DEFENSE WASHINGTON DC, 1993
Physical and Data-Link Security Techniques for Future Communication Systems
Marco Baldi, Stefano Tomasin (eds.), 2016
Physical Layer Security in Wireless Communications
Xiangyun Zhou, Lingyang Song, Yan Zhang, 2013
