نتایج جستجو
Introduction to Security and Network Forensics
Buchanan, 2011
Security Protocols: 7th International Workshop, Cambridge, UK, April 19-21, 1999. Proceedings
Roger Needham (auth.), 2000
Security Protocols: 7th International Workshop, Cambridge, UK, April 19-21, 1999. Proceedings
Roger Needham (auth.), 2000
Security Protocols: 8th International Workshop Cambridge, UK, April 3–5, 2000 Revised Papers
Roger Needham (auth.), 2001
Security Protocols: 9th International Workshop Cambridge, UK, April 25–27, 2001 Revised Papers
Roger Needham (auth.), 2002
Security Protocols: 9th International Workshop Cambridge, UK, April 25–27, 2001 Revised Papers
Roger Needham (auth.), 2002
Top Secret America: The Rise of the New American Security State
Dana Priest, 2011
Foundations of Security Analysis and Design IV: FOSAD 2006/2007 Tutorial Lectures
Martín Abadi (auth.), 2007
Foundations of Security Analysis and Design IV: FOSAD 2006/2007 Tutorial Lectures
Martín Abadi (auth.), 2007
The Library Security and Safety Guide
Miriam B. Kahn, 2009
Pakistan: Democracy, Development and Security Issues
Veena Kukreja, 2005
Radiation Damage and Fission Product Release in Zirconium Nitride
G.W. Egeland; Los Alamos National Laboratory.; United States. National Nuclear Security Administration.; United States. Dept. of Energy. Office of Scientific, 2005
Handbook of financial cryptography and security
Burton Rosenberg, 2010
How to Escape Lifetime Security and Pursue Your Impossible Dream: A Guide to Transforming Your Career
Kenneth John Atchity, 2004
Security vs. Access: Balancing Safety and Productivity in the Digital School
LeAnne Robinson, 2010
