نتایج جستجو
Security sage's guide to hardening the network infrastructure
Steven Andrés, 2004
Moodle Security
Darko Mileti, 2011
Moodle Security
Darko Mileti, 2011
Cryptography and Network Security Principles and Practices
William Stallings, 2005
Cryptography and Network Security: Principles and Practice
William Stallings, 2014
Cryptography and Network Security: Principles and Practice (5th Edition)
William Stallings, 2010
Cryptography and Network Security: Principles and Practice (6th Edition)
William Stallings, 2014
Environment and Security: Discourses and Practices
Miriam R. Lowi, 2000
Conflict and War in the Middle East: From Interstate War to New Security
Bassam Tibi (auth.), 1998
Bosnia and the New Collective Security
Elinor Sloan, 1998
The NSA Report: Liberty and Security in a Changing World
The President"s Review Group on Intelligence, 2014
Democracies and Small Wars (Besa Studies in International Security)
Efraim Inbar, 2003
Israel's National Security: Issues and Challenges Since the Yom Kippur War
Efraim Inbar, 2008
Regional Security Regimes: Israel and Its Neighbors
Efraim Inbar, 1995
Applications of Data Mining in Computer Security
Steven Noel, 2002
Data and Applications Security and Privacy XXVII: 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings
Sabrina De Capitani di Vimercati, 2013
Damodaran on Valuation: Security Analysis for Investment and Corporate Finance
Aswath Damodaran, 1994
Damodaran on valuation: security analysis for investment and corporate finance
Aswath Damodaran, 1994
