نتایج جستجو
Nanoelectronic Devices for Hardware and Software Security (Security, Privacy, and Trust in Mobile Communications)
Arun Kumar Singh (editor), Balwinder Raj (editor), 2021
Advances in Information and Computer Security: 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8–10, 2021, Proceedings (Lecture Notes in Computer Science, 12835)
Toru Nakanishi (editor), Ryo Nojima (editor), 2021
Computer Security – ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021, Proceedings, Part II
Elisa Bertino, Haya Shulman, Michael Waidner, 2021
Core Software Security: Security at the Source
James Ransome, Anmol Misra, 2013
Rights As Security: The Theoretical Basis Of Security Of Person
Rhonda Powell, 2019
Challenges in the IoT and Smart Environments: A Practitioners' Guide to Security, Ethics and Criminal Threats (Advanced Sciences and Technologies for Security Applications)
Reza Montasari (editor), Hamid Jahankhani (editor), Haider Al-Khateeb (editor), 2021
Internet of Things Security: Architectures and Security Measures
Chuan-Kun Wu, 2021
Internet of Things Security: Architectures and Security Measures
Chuan-Kun Wu, 2021
Governing Security After War: The Politics of Institutional Change in the Security Sector
Louis-Alexandre Berg, 2022
PRAGMATIC Security Metrics: Applying Metametrics to Information Security
W. Krag Brotby, Gary Hinson, 2013
Offensive Security - BackTrack to the Max Cracking the Perimeter V
Offensive Security, 2008
Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-601)
Wm. Arthur Conklin, Greg White, Chuck Cothren, Roger Davis, Dwayne Williams, 2021
Principles of Computer Security: CompTIA Security+ and Beyond - Lab Manual - (Exam SY0-601)
Jonathan Weissman, 2021
CIS Critical Security Controls
Center for Internet Security, 2021
Terrorism: Commentary on Security Documents Volume 147: Assessing the 2017 U.S. National Security Strategy
Douglas C. Lovelace Jr. (editor), 2018
Definitive Guide to Security in Jakarta EE - Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More
Arjan Tijms, Teo Bais, Werner Keil, 2022
Connected Places: cyber security principles.
National Cyber Security Centre
Water Security in India: Water Policy and Human Security in the Indian Region
Vandana Asthana; A. C. Shukla, 2014
Security and Stability in the New Space Age: The Orbital Security Dilemma
Brad Townsend, 2020
Victims as Security Threats: Refugee Impact on Host State Security in Africa
Edward Mogire, 2016
