نتایج جستجو
Social Security Reform in Transition Economies: Lessons from Kazakhstan
Charles M. Becker, 2009
Writing Security Tools and Exploits
James Foster, 2006
ITIL Security Management realisieren GERMAN
Jochen Brunnstein
Wireless Operational Security
John RittinghousePhDCISM, 2004
Cryptography and Network Security, 4th Edition
William Stallings, 2005
Japan's Asia Policy: Regional Security and Global Interests
Wolf Mendl, 1995
Security, Citizenship and Human Rights: Shared Values in Uncertain Times
Derek McGhee (auth.), 2010
Worst-Case Scenario? Governance, Mediation and the Security Regime
Stuart Price, 2011
Wiley Pathways Network Security Fundamentals
Eric Cole, 2007
Routledge Handbook of Human Security (Routledge Handbooks
Mary Martin, 2013
Incident Response: A Strategic Guide to Handling System and Network Security Breaches
E. Eugene Schultz, 2001
An Introduction to Information Security and ISO 27001
Steve G Watkins, 2008
Application Security in the ISO27001 Environment
Vinod Vasudevan, Anoop Mangla, Firosh Ummer, Sachin Shetty, Sangita Pakala, 2008
