نتایج جستجو
Bosnian Security after Dayton: New Perspectives (Contemporary Security Studies)
Michael Innes, 2006
Bosnian Security after Dayton: New Perspectives (Contemporary Security Studies)
Michael Innes, 2006
Exploring the Security Landscape: Non-Traditional Security Challenges
Anthony J. Masys (eds.), 2016
IT Security Management: IT Securiteers - Setting up an IT Security Function
Alberto Partida, 2010
IT Security Management: IT Securiteers - Setting up an IT Security Function
Alberto Partida, 2010
Workplace Security Playbook. The New Manager's Guide to Security Risk
Bob Hayes (Eds.), 2013
Embedded Java Security: Security for Mobile Devices
Mourad Debbabi, 2006
Embedded Java Security: Security for Mobile Devices
Mourad Debbabi, 2006
Embedded Java Security: Security for Mobile Devices
Mourad Debbabi, 2006
Embedded Java Security: Security for Mobile Devices
Mourad Debbabi, 2007
People-Centric Security: Transforming Your Enterprise Security Culture
Lance Hayden, 2015
Effective Security Management, Fourth Edition (Effective Security Management)
Charles A. Sennewald, 2003
Computer Security – ESORICS 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II
Ioannis Askoxylakis, Sotiris Ioannidis, Sokratis Katsikas, Catherine Meadows (eds.), 2016
Computer Security – ESORICS 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I
Ioannis Askoxylakis, Sotiris Ioannidis, Sokratis Katsikas, Catherine Meadows (eds.), 2016
Security Design Patterns
Bob Blakley, Craig Heath, Open Group Security Forum, 2004
People-centric security : transforming your enterprise security culture
Hayden, Lance, 2016
Security Intelligence A Practitioners Guide to Solving Enterprise Security Challenges
Qing Li, Gregory Clark, 2015
