نتایج جستجو
Technology and Security: Governing Threats in the New Millennium
Brian Rappert (eds.), 2007
Investigative Data Mining for Security and Criminal Detection
Jesus Mena, 2003
Machine Learning and Data Mining for Computer Security: Methods and Applications
Marcus A. Maloof, 2005
Machine Learning and Data Mining for Computer Security: Methods and Applications
Marcus A. Maloof (auth.), 2006
The Alarm, Sensor & Security Circuit Cookbook
Thomas Petruzzellis, 1993
The Alarm, Sensor & Security Circuit Cookbook
Thomas Petruzzellis, 1994
Formal Models and Techniques for Analyzing Security Protocols
Veronique Cortier, 2011
Internet and Intranet Security Management: Risks and Solutions
Lech Janczewski
Trickle Up Poverty: Stopping Obama's Attack on Our Borders, Economy, and Security
Michael Savage, 2010
Your Money Ratios: 8 Simple Tools for Financial Security
Charles Farrell J.D. L.L.M., 2009
Firewall Design and Analysis (Computer and Network Security)
Alex X. Liu, 2010
Practical Embedded Security: Building Secure Resource-Constrained Systems
Timothy Stapko, 2007
Practical Embedded Security: Building Secure Resource-Constrained Systems
Timothy Stapko, 2007
Security in Embedded Devices
Catherine H. Gebotys (auth.), 2010
Trustworthy Reconfigurable Systems: Enhancing the Security Capabilities of Reconfigurable Hardware Architectures
Thomas Feller (auth.), 2014
