نتایج جستجو
Advances in Cryptology - ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings
Martin Hirt, Ueli Maurer, Vassilis Zikas (auth.), Josef Pieprzyk (eds.), 2008
Advances in Cryptology - ASIACRYPT’99: International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November 14-18, 1999. Proceedings
Kenji Koyama, Yukio Tsuruoka, Noboru Kunihiro (auth.), Kwok-Yan Lam, Eiji Okamoto, Chaoping Xing (eds.), 1999
Advances in Cryptology – ASIACRYPT 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings
Christophe De Cannière, Christian Rechberger (auth.), Xuejia Lai, Kefei Chen (eds.), 2006
Advances in Cryptology – ASIACRYPT 2007: 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings
Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen K. Lenstra, Dag Arne Osvik (auth.), Kaoru Kurosawa (eds.), 2007
Advances in Cryptology – ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings
Alex Biryukov, Dmitry Khovratovich (auth.), Mitsuru Matsui (eds.), 2009
Access Control Systems: Security, Identity Management and Trust Models
Messaoud Benantar, 2005
Biofuels, Land Grabbing and Food Security in Africa
Prosper B. Matondi, Kjell Havnevik, Atakilte Beyene, 2011
Inter-Arab Alliances: Regime Security and Jordanian Foreign Policy
Curtis R. Ryan, 2009
Abraham Epstein: The Forgotten Father of Social Security
Pierre Epstein, 2007
Corporate Governance and Resource Security in China: The Transformation of China's Global Resources Companies
Xinting Jia, Roman Tomasic, 2009
The embassy of the future recommendations for the design of future U.S. embassy buildings
Committee on Research for the Security of Future U.S. Embassy Buildings, Building Research Board, Commission on Engineering and Technical Systems, National Research Council., 1986
A Practical Guide to Managing Information Security
Steve Purser, 2004
AAA Identity Management Security
Vivek Santuka, Premdeep Banga, Brandon J. Carroll, 2010
Addicted to Oil: America's Relentless Drive for Energy Security
Ian Rutledge, 2005
Brittle Power: Energy Strategy for National Security
Hunter Lovins, Amory B. Lovins, 2001
19 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
Michael Howard, David LeBlanc, John Viega, 2005
24 Deadly Sins of Software Security Programming Flaws and How to Fix Them
Michael Howard, David LeBlanc, and John Viega, 2009
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
Michael Howard, David LeBlanc, John Viega, 2009
