نتایج جستجو
RSA Security's official guide to cryptography
Jan Pelzl, Thomas Wollinger, Christof Paar (auth.), Mitsuru Matsui, Robert J. Zuccherato (eds.), 2001
Verification of security intelligence for a resilient SCADA system
Sumit Chakraborty, 2013
CISSP (r): Certified Information Systems Security Professional Study Guide, 2nd Edition
Ed Tittle, James Michael Stewart, Mike Chapple, Ed Tittel, 2004
CISSP: Certified Information Systems Security Professional Study Guide
Ed Tittle, James Michael Stewart, Mike Chapple, Ed Tittel, 2004
CISSP: Certified Information Systems Security Professional Study Guide
James Michael Stewart, Ed Tittel, Mike Chapple, 2005
CISSP: Certified Information Systems Security Professional Study Guide
Ed Tittel, Mike Chapple, James Michael Stewart, 2003
CISSP: Certified Information Systems Security Professional study guide
Ed Tittel, Mike Chapple, James Michael Stewart, 2003
CISSP: Certified Information Systems Security Professional study guide
Ed Tittel, Mike Chapple, James Michael Stewart, 2003
CISSP: Certified Information Systems Security Professional study guide
Ed Tittle, James Michael Stewart, Mike Chapple, Ed Tittel, 2004
CISSP: Certified Information Systems Security Professional study guide
Ed Tittle, James Michael Stewart, Mike Chapple, Ed Tittel, 2004
CISSP: Certified Information Systems Security Professional study guide
Ed Tittel, Mike Chapple, James Michael Stewart, 2003
CISSP: Certified Information Systems Security Professional study guide
Ed Tittle, James Michael Stewart, Mike Chapple, Ed Tittel, 2004
CISSP: Certified Information Systems Security Professional Study Guide
James M. Stewart, Ed Tittel, Mike Chapple, 2008
Distributed Systems Security: Issues, Processes and Solutions
Abhijit Belapurkar, Anirban Chakrabarti, Harigopal Ponnapalli, Niranjan Varadarajan, Srinivas Padmanabhuni, Srikanth Sundarrajan, 2009
Enterprise Information Security and Privacy
Warren C. Axelrod, Jennifer L. Bayuk, Daniel Schutzer, 2009
Enterprise Information Security and Privacy
Warren C. Axelrod, Jennifer L. Bayuk, Daniel Schutzer, 2009
Enterprise Information Systems Assurance And System Security: Managerial And Technical Issues
Merrill Warkentin, Rayford B. Vaughn, 2006
Enterprise Security: The Manager's Defense Guide
David Leon Clark, 2002
Formal Logical Methods for System Security and Correctness
Orna Grumberg, Orna Grumberg, Tobias Nipkow, Christian Pfaller, 2008
Information Security: Design, Implementation, Measurement, and Compliance
Timothy P. Layton, 2006
Information Systems Security: Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedings
Atul Prakash (auth.), Patrick McDaniel, Shyam K. Gupta (eds.), 2007
Network and System Security
John R. Vacca, 2010
Open Source Systems Security Certification
Dennis Blumenfeld, 2009
