نتایج جستجو
Practical Vo: IP Security
Thomas Porter, Jan Kanclirz, Andy Zmolek, Antonio Rosela, Michael Cross, Larry Chaffin, Brian Baskin, 2006
Guide to tactical perimeter defense: becoming a security network specialist
Randy Weaver, 2008
Financial Statement Analysis and Security Valuation 4ed
Stephan H. Penman, 2009
Cryptography and Data Security
Dorothy Elizabeth Robling Denning, 1982
Four Views on Eternal Security
J. Matthew Pinson, 2002
Handbook of Research on Wireless Security
Yan Zhang, 2008
Handbook of Research on Wireless Security
Yan Zhang, 2008
Intelligence and National Security: A Reference Handbook
John Ransom Clark, 2007
Agile IT Security Implementation Methodology
Jeff Laskowski, 2011
Agile IT Security Implementation Methodology
Jeff Laskowski, 2011
New European Security Disorder
Simon Duke, 1994
The elusive quest for European security: from EDC to CFSP
Simon Duke, 2000
Conflict and Security in Central Asia and the Caucasus
Hooman Peimani, 2009
Internet and Intranet Security
Rolf Oppliger, 2007
Fundamentals of network security
John E. Canavan, 2001
Internet Firewalls and Network Security
Chris Hare, 1996
