نتایج جستجو
Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS ... (Lecture Notes in Computer Science, 6258)
Igor Kotenko (editor), Victor Skormin (editor), 2010
Transnational Migration and Human Security: The Migration-Development-Security Nexus
Thanh-Dam Truong, Des Gasper (auth.), Thanh-Dam Truong, Des Gasper (eds.), 2011
Energy Security in Asia (Routledge Security in Asia Pacific Series)
Michael Wesley, 2007
Information Assurance: Managing Organizational IT Security Risks
Joseph Boyce Employee of the Department of Defense, Daniel Jennings Information Systems Security ManagerEuropean Command (EUCOM), 2002
Enterprise Security Architecture Using IBM Tivoli Security Solutions
IBM Redbooks, 2004
Beautiful Security: Leading Security Experts Explain How They Think
Andy Oram, John Viega, 2009
Beautiful Security: Leading Security Experts Explain How They Think
Andy Oram, John Viega, 2009
European Union Security Dynamics: In The New National Interest (New Security Challenges Series)
Janne Haaland Matlary, 2009
Software security : building security in
Gary McGraw, 2006
Software Security: Building Security In
Gary McGraw, 2006
Software Security: Building Security In
Gary McGraw, 2006
IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job
Chris Butler, Russ Rogers, Mason Ferratt, Greg Miles, Ed Fuller, Chris Hurley, Rob Cameron, Brian Kirouac, 2007
IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job
Chris Butler, Russ Rogers, Mason Ferratt, Greg Miles, Ed Fuller, Chris Hurley, Rob Cameron, Brian Kirouac, 2007
Practical Oracle Security: Your Unauthorized Guide to Relational Database Security
Josh Shaul, Aaron Ingram, 2007
Western Balkans Security Observer Vol 5 No. 18 - Ten Years of Security Sector Reform in Serbia
Marko Zilovic, Miroslav Hadzic, Sonja Stojanovic, Filip Ejdus (eds.), 2010
Information Flow Based Security Control Beyond RBAC: How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)
Klaus-Peter Fischer-Hellmann (auth.), Rainer Bischoff (eds.), 2012
Future of the Nuclear Security Environment in 2015: Proceedings of a Russian-U.S. Workshop
Joint Committees on the Future of the Nuclear Security Environment in 2015, Russian Academy of Sciences, National Research Council, 2009
