نتایج جستجو
Critical Infrastructure: Homeland Security and Emergency Preparedness, Second Edition
Robert Radvanovsky, Allan McDougall, 2009
Mobile and Wireless Network Security and Privacy
S. Kami Makki, Peter Reiher, Kia Makki, Niki Pissinou, Shamila Makki, 2007
Mobile and Wireless Network Security and Privacy
S. Kami Makki, Peter Reiher, Kia Makki, Niki Pissinou, Shamila Makki, 2007
Decision and Game Theory for Security: Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings
Benjamin Johnson, Pascal Schöttle, Rainer Böhme (auth.), Jens Grossklags, Jean Walrand (eds.), 2012
Advances in Cryptology – ASIACRYPT 2011: 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings
Yuanmi Chen, Phong Q. Nguyen (auth.), Dong Hoon Lee, Xiaoyun Wang (eds.), 2011
Advances in Cryptology – ASIACRYPT 2011: 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings
Yuanmi Chen, Phong Q. Nguyen (auth.), Dong Hoon Lee, Xiaoyun Wang (eds.), 2011
Advances in Information Security and Assurance: Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings
Kitae Jeong, Joongeun Choi, Yuseop Lee, Changhoon Lee, Jaechul Sung, Haeryong Park (auth.), Jong Hyuk Park, Hsiao-Hwa Chen, Mohammed Atiquzzaman, Changhoon Lee, Tai-hoon Kim, Sang-Soo Yeo (eds.), 2009
Advances in Information Security and Assurance: Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings
Kitae Jeong, Joongeun Choi, Yuseop Lee, Changhoon Lee, Jaechul Sung, Haeryong Park (auth.), Jong Hyuk Park, Hsiao-Hwa Chen, Mohammed Atiquzzaman, Changhoon Lee, Tai-hoon Kim, Sang-Soo Yeo (eds.), 2009
Soils and Food Security
R E Hester, R M Harrison, Luca Montanarella, Peter Gregory, Wendy Peterman, Ingrid Iborn, Fredrick O Ayuke, Paul Hallett, David Robinson, Bernard Vanlauwe, David Manning, 2012
Hunger Efforts and Food Security
James C. Tobin, 2008
Civilizing Security
Ian Loader, Neil Walker, 2007
Deviance in International Relations: ‘Rogue States’ and International Security
Wolfgang Wagner, Wouter Werner, Michal Onderco (eds.), 2014
Contending with Terrorism: Roots, Strategies, and Responses (International Security Readers)
Michael E. Brown, Owen R. Cote Jr., Sean M. Lynn-Jones, Steven E. Miller, 2010
A Practical Guide to Security Assessments
Sudhanshu Kairab, 2005
Asia’s New Institutional Architecture: Evolving Structures for Managing Trade, Financial, and Security Relations
Vinod K. Aggarwal, Min Gyo Koo (auth.), Professor Vinod K. Aggarwal, Professor Min Gyo Koo (eds.), 2008
Assessing and Managing Security Risk in IT Systems: A Structured Methodology
John McCumber, 2004
Assessing and Managing Security Risk in IT Systems: A Structured Methodology
John McCumber, 2004
Background Screening and Investigations: Managing Hiring Risk from the HR and Security Perspectives
W. Barry Nixon, Kim Kerr, 2008
E-Mail Rules: A Business Guide to Managing Policies, Security, and Legal Issues for E-Mail and Digital Communication
Nancy Flynn Randolph Kahn, 2003
How to Cheat at Managing Information Security
Osborne M., Summitt P., 2006
Information Assurance: Managing Organizational IT Security Risks
Joseph Boyce, Daniel Jennings, 2002
