نتایج جستجو
Using the Common Criteria for IT Security Evaluation
Debra S. Herrmann, 2002
Security markets: stochastic models
Darrell Duffie, 1988
Security Markets: Stochastic Models
Darrell Duffie, 1988
Security engineering: a guide to building dependable distributed systems
Ross J. Anderson, 2008
Security engineering: a guide to building dependable distributed systems
Ross J. Anderson, 2001
Security engineering: a guide to building dependable distributed systems
Ross J. Anderson, 2001
Security Protocols XVI: 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers
Bruce Christianson (auth.), 2011
Security Protocols XVI: 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers
Bruce Christianson (auth.), 2011
Security Protocols XVI: 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers
Bruce Christianson (auth.), 2011
Security Protocols XVII: 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers
Bruce Christianson (auth.), 2013
Iris Biometrics: From Segmentation to Template Security
Christian Rathgeb, 2013
Iris Biometrics: From Segmentation to Template Security
Christian Rathgeb, 2013
Computer Security Within Organizations
Adrian R. Warman (auth.), 1993
The Routledge Handbook of Security Studies(Routledge Handbooks)
Victor Mauer (Editor), 2010
Group Policy: Fundamentals, Security, and the Managed Desktop
Jeremy Moskowitz, 2013
Group Policy: Fundamentals, Security, and the Managed Desktop
Jeremy Moskowitz, 2013
Group Policy: Fundamentals, Security, and the Managed Desktop
Jeremy Moskowitz, 2015
