نتایج جستجو
Security Operations Center: Building, Operating, and Maintaining your SOC
Joseph Muniz, Gary McIntyre, Nadhem AlFardan, 2015
Cyber Security Cyber Attacks and Counter Measures: User Perspective (PGDCS-03)
Nihar Ranjan Pande (ed.), 2016
Cryptography And Network Security
Atul Kahate, 2007
Gender, Peace and Security in Africa
Cheryl Hendricks, Romi Sigsworth, 2018
Another Look at “Provable Security"
Neal Koblitz, Alfred J. Menezes, 2005
Governing Security: Explorations of Policing and Justice
Clifford D. Shearing; Les Johnston, 2013
Domain Linkages and Privatization in Social Security
Jun-Young Kim, Per-Gunnar Svensson, 2018
The Markets for Force: Privatization of Security Across World Regions
Molly Dunigan (editor), Ulrich Petersohn (editor), 2015
CEH v6 Module 66 Security Convergence.
coll., 2008
High-Security Mechanical Locks: An Encyclopedic Reference
Graham Pulford, 2007
Fedora 11 Security Guide: A Guide to Securing Fedora Linux (Edition 1.0)
Johnray Fuller, John Ha, David O'Brien, Scott Radvan, Eric Christensen, 2008
Introduction to Cyber Security
Jeetendra Pande, 2017
East Asian Security in the Post-Cold War Era
Sheldon W. Simon, 1993
Security in Private Branch IP-Telephony Network with QoS Demands.
Imran Akbar, Khurram Shahzad, 2009
Reassessing Security in the South Caucasus: Regional Conflicts and Transformation
Annie Jafalian (editor), 2011
Database Security
Silviana Castano, 1995
Ethics and Social Security Reform
Erik Schokkaert, 2019
High-rise Security and Fire Life Safety
Geoff Craighead
