نتایج جستجو
A Curriculum of Fear: Homeland Security in U.S. Public Schools
Nicole Nguyen, 2016
Human Security and Climate Change in Southeast Asia: Managing Risk and Resilience
Lorraine Elliott, 2012
Online security for the business traveler
Deborah Gonzalez, 2014
Retail Security and Loss Prevention
Read Hayes (Auth.), 1991
The Ultimate Computer Security Survey
James L Schaub, 1995
Developing a Comprehensive Security Program. Elements, Characteristics, and Leadership
Bob Hayes, Kathleen Kotwica, 2014
Rethinking Risk in National Security: Lessons of the Financial Crisis for Risk Management
Michael J. Mazarr (auth.), 2016
Risk, Crisis and Security Management
Edward Borodzicz, 2005
Information Security For The Little Guy
Joseph Hoffman, 2006
Privacy and Security for Cloud Computing
Siani Pearson (auth.), 2013
Privacy, Security and Trust within the Context of Pervasive Computing
Philip Robinson, 2004
Privacy, Security and Trust within the Context of Pervasive Computing
Philip Robinson, 2005
Security in Distributed, Grid, Mobile, and Pervasive Computing
Yang Xiao, 2007
Security in Distributed, Grid, Mobile, and Pervasive Computing
Yang Xiao, 2007
Security in Distributed, Grid, Mobile, and Pervasive Computing
Yang Xiao, 2007
Security in Distributed, Grid, Mobile, and Pervasive Computing
Yang Xiao, 2007
Security in Distributed, Grid, Mobile, and Pervasive Computing
Yang Xiao, 2007
Security in Distributed, Grid, Mobile, and Pervasive Computing
Yang Xiao, 2007
Security in Pervasive Computing: First International Conference, Boppard, Germany, March 12-14, 2003. Revised Papers
Friedemann Mattern (auth.), 2004
Mobile Phone Security and Forensics: A Practical Approach
Iosif I. Androulidakis (auth.), 2016
