نتایج جستجو
Changing Transatlantic Security Relations: Do the U.S, the EU and Russia Form a New Strategic Triangle?
Jan Hallenberg, Hakan Karlsson, 2006
On the Edge: Ukrainian-Central European-Russian Security Triangle
Margarita Mercedes Balmaceda, 2001
Security analysis
Benjamin Graham, David Dodd, Warren Buffett, 2008
Advances in Cryptology - ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004. Proceedings
Taizo Shirai, Bart Preneel (auth.), Pil Joong Lee (eds.), 2004
Advances in Cryptology - ASIACRYPT 2005: 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005. Proceedings
Pascal Paillier, Damien Vergnaud (auth.), Bimal Roy (eds.), 2005
Advances in Cryptology — ASIACRYPT '96: International Conference on the Theory and Applications of Cryptology and Information Security Kyongju, Korea, November 3–7, 1996 Proceedings
Atsuko Miyaji (auth.), Kwangjo Kim, Tsutomu Matsumoto (eds.), 1996
Advances in Cryptology — ASIACRYPT 2000: 6th International Conference on the Theory and Application of Cryptology and Information Security Kyoto, Japan, December 3–7, 2000 Proceedings
Alex Biryukov, Adi Shamir (auth.), Tatsuaki Okamoto (eds.), 2000
Advances in Information Security and Its Application.. Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009
Jong Hyuk Park, Justin Zhan, Changhoon Lee, Guilin Wang, Tai-Hoon Kim, Sang-Soo Yeo, 2009
Cyber crime investigations: bridging the gaps between security professionals, law enforcement, and prosecutors
Anthony Reyes, Richard Brittson, Kevin O'Shea, James Steele, 2007
Aviation Security Law
Dr. Ruwantissa Abeyratne (auth.), 2010
Career Opportunities In Law Enforcement, Security And Protective Services, 2nd Edition
Susan Echaore-McDavid, 2005
A Matter of Security: The Application of Attachment Theory to Forensic Psychiatry and Psychotherapy (Forensic Focus)
Friedemann Pf¿fflin, Gwen Adshead, 2003
American National Security and Civil Liberties in an Era of Terrorism
David B. Cohen, John W. Wells, 2004
Body of Secrets: Anatomy of the Ultra-Secret National Security Agency
James Bamford, 2002
Body of Secrets: Anatomy of the Ultra-Secret National Security Agency
James Bamford, 2001
Body of Secrets: Anatomy of the Ultra-Secret National Security Agency
James Bamford, 2002
Body of Secrets: Anatomy of the Ultra-Secret National Security Agency
James Bamford, 2001
Body of Secrets: Anatomy of the Ultra-Secret National Security Agency
James Bamford, 2001
Error Correcting Coding and Security for Data Networks : Analysis of the Superchannel Concept
GrigoriiKabatiansky, 2005
A Classical Introduction to Cryptography: Applications for Communications Security
Serge Vaudenay, 2005
