نتایج جستجو
Machine readable security documents
Pira International Ltd, 2012-02-21
Multiple security technologies for personal ID
Pira International Ltd, 2012-02-21
RSA Security's official guide to cryptography
Steve Burnett, 2001
Security planning & disaster recovery
Eric Maiwald, 2002
Security planning & disaster recovery
Eric Maiwald, 2002
Security Valuation and Risk Analysis: Assessing Value in Investment Decision-Making
Kenneth S. Hackel, 2010
The New School of Information Security
Adam Shostack, 2008
The Caspian Sea: A Quest for Environmental Security
Natalia Mirovitskaya, 2000
NET security and cryptography
Thorsteinson, Peter, 2003
Immigration Phobia and the Security Dilemma: Russia, Europe, and the United States
Mikhail A. Alexseev, 2005
Europe and the United States: The Emerging Security Partnership
Franz Oswald, 2006
Quantitative Security Risk Assessment of Enterprise Networks
Xinming Ou, 2011
Quantitative security risk assessment of enterprise networks
Xinming Ou, 2011
Quantitative Security Risk Assessment of Enterprise Networks
Xinming Ou, 2011
Trilateral Security: Defense and Arms Control Policies in the 1980s
Gerard Smith, 1983
Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems
Elias Kyriakides, 2015
