نتایج جستجو
Security : The False and the True
W.T. Purkiser, 1993
Math for Security: From Graphs and Geometry to Spatial Analysis
Daniel Reilly, 2023
Personnel Protection: Concepts of Executive Security. Proven Practices
Jerome Miller and Radford Jones (Auth.), 2013
Personnel Protection: Aircraft Security. Proven Practices
Jerome Miller and Radford Jones (Auth.), 2013
Personnel Protection: Executive Worksite Security. Proven Practices
Jerome Miller and Radford Jones (Auth.), 2013
Bringing a Corporate Security Culture to Life. Proven Practices
Peter Cheviot (Auth.), 2013
Cyber Security: Python for Penetration Testing
Travis Czech
Penetration Testing with Kali Linux - PEN-200 2023
Offensive Security, 2023
Advanced Security Testing with Kali Linux
Daniel Dieterle
Advanced Interviewing Techniques: Proven Strategies for Law Enforcement, Military, and Security Personnel
Jack Schafer, Joe Navarro, 2023
Security in Computing
Charles Pfleeger, Shari Pfleeger, Lizzie Coles-Kemp, 2023
Breaking the Binaries in Security Studies: A Gendered Analysis of Women in Combat
Ayelet Harel-Shalev, Shir Daphna-Tekoah, 2020
Digital Image Security: Techniques and Applications
Amit Kumar Singh, Stefano Berretti, Ashima Anand, Amrit Kumar Agrawal, 2024
Security Expertise: Practice, Power, Responsibility
Trine Villumsen Berling; Christian Bueger, 2015
Desertification in the Mediterranean Region: A Security Issue
W.G. Kepner (editor), Jose L. Rubio (editor), David A. Mouat (editor), Fausto Pedrazzini (editor), 2005
Computer Safety, Reliability and Security: 18th International Conference, SAFECOMP'99, Toulouse, France, September 27-29, 1999, Proceedings (Lecture Notes in Computer Science, 1698)
Massimo Felici (editor), Karama Kanoun (editor), Alberto Pasquini (editor), 1999
Ukrainian Lab: Global Security, Environment, and Disinformation Through the Prism of Ukraine
Sasha Dovzhyk (ed.), 2023
