نتایج جستجو
Computer Security Division - 2012 Annual Report
Patrick O’Reilly, 2013
Data Security Technologies in SAS 9.1.3
SAS Publishing, 2005
Inside Network Perimeter Security
Stephen Northcutt, 2005
World in Transition Annual Report 2007, Climate Change as a Security Risk: Summary for Policy-Makers
German Advisory Council on Global Change (WBGU)
Arctic Security in an Age of Climate Change
James Kraska, 2011
Nation, Immigration, and Environmental Security
Jessica LeAnn Urban, 2008
Nation, Immigration, and Environmental Security
Jessica LeAnn Urban (auth.), 2008
Urbanization, policing, and security : global perspectives
Gary W Cordner
Human and Water Security in Israel and Jordan
Philip Jan Schäfer (auth.), 2013
Foreign Security Policy, Gender, and US Military Identity
Elgin Medea Brunner, 2013
Foreign Security Policy, Gender, and US Military Identity
Elgin Medea Brunner (auth.), 2013
Intelligent Multimedia Analysis for Security Applications
Simone Calderara, 2010
Flood Planning: The Politics of Water Security
Jeroen Warner, 2011
Low Cost Emergency Water Purification Technologies. Integrated Water Security Series
Chittaranjan Ray, 2014
Navigating Perilous Waters: An Israeli Strategy for Peace and Security
Ephraim Sneh, 2005
Review of the Epa Water Security Research and Technical Support Action
National Research Council, 2004
Risk Assessment for Water Infrastructure Safety and Security
Anna Doro-on, 2011
Riverbank Filtration for Water Security in Desert Countries
Mohamed Shamrukh, 2010
Security and Emergency Planning for Water and Wastewater Utilities
Stanley States, 2009
