نتایج جستجو
Climate Change and Security: A Gathering Storm of Global Challenges (Security and the Environment)
Christian Webersik, 2010
People-Centric Security: Transforming Your Enterprise Security Culture
Lance Hayden, 2015
Human Rights, Human Security, and State Security [3 volumes]: The Intersection
Saul Takahashi, 2014
Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets (Information Security)
Information Security, 2008
Effective Security Management, Fourth Edition (Effective Security Management)
Charles A. Sennewald, 2003
Advances in Information and Computer Security: 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings
Kazuto Ogawa, Katsunari Yoshioka (eds.), 2016
Computer Security – ESORICS 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II
Ioannis Askoxylakis, Sotiris Ioannidis, Sokratis Katsikas, Catherine Meadows (eds.), 2016
Computer Security – ESORICS 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I
Ioannis Askoxylakis, Sotiris Ioannidis, Sokratis Katsikas, Catherine Meadows (eds.), 2016
Security, Democracy and War Crimes: Security Sector Transformation in Serbia
James Gow, Ivan Zverzžhanovski (auth.), 2013
Global Security, Safety and Sustainability - The Security Challenges of the Connected World: 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedings
Hamid Jahankhani, Alex Carlile, David Emm, Amin Hosseinian-Far, Guy Brown, Graham Sexton, Arshad Jamal (eds.), 2016
Security Design Patterns
Bob Blakley, Craig Heath, Open Group Security Forum, 2004
People-centric security : transforming your enterprise security culture
Hayden, Lance, 2016
North Korea and Regional Security in the Kim Jong-un Era: A New International Security Dilemma
Bruce E. Bechtol Jr. (auth.), 2014
Security Intelligence A Practitioners Guide to Solving Enterprise Security Challenges
Qing Li, Gregory Clark, 2015
Thor's Microsoft security bible : a collection of practical security techniques
Timothy ''Thor'' Mullen, 2011
Information Security — the Next Decade: Proceedings of the IFIP TC11 eleventh international conference on information security, IFIP/Sec ’95
Jan H. P. Eloff, Sebastiaan H. von Solms (eds.), 1995
