نتایج جستجو
The Big House: Life Inside a Supermax Security Prison
Warden James H. Bruton, 2004
Security Operations Management, Second Edition
Robert McCrie, 2006
Secure Data Management in Decentralized Systems (Advances in Information Security)
Ting Yu (Editor), 2006
Managing Information Security
John R. Vacca, 2010
Conflict and Human Security in Africa: Kenya in Perspective
Asfaw Kumssa, 2011
Regionalization and Security in Southern Africa
Nana Poku (auth.), 2001
CryptoGraphics: Exploiting Graphics Cards for Security
Debra L. Cook, 2006
CryptoGraphics: Exploiting Graphics Cards for Security
Debra L. Cook, 2006
Information Systems Security: 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings
Angelos D. Keromytis (auth.), 2009
Information Systems Security: 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings
Angelos D. Keromytis (auth.), 2009
Challenge and Response : Anticipating U. S. Military Security Concern
Karl P. Magyar, 1994
Global Security Concerns : Anticipating the Twenty-First Century
Karl P. Magyar, 1996
Homeland Security in the UK: Government Preparations for Terrorist Attack since 9/11
Paul Wilkinson, 2007
XML Security
Dournaee B., 2002
XML Security
BlakeDournaee, 2002
Lords of Secrecy: The National Security Elite and America's Stealth Warfare
Scott Horton, 2015
Private Security and the Investigative Process, Third Edition
Charles P. Nemeth, 2010
