نتایج جستجو
Readings and cases in information security : law and ethics
Michael E Whitman, 2011
Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies
Junaid Ahmed Zubairi, 2011
Strategic Challenges: America's Global Security Agenda
Stephen J. Flanagan, 2008
Disclosure of Security Vulnerabilities: Legal and Ethical Issues
Alana Maurushat (auth.), 2013
Wireless Network Security
Yang Xiao, 2007
Wireless network security
Yang Xiao, 2007
Wireless network security
Yang Xiao, 2007
Information Security Management Principles - Second edition
Alexander, David, 2013
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Gordon Fyodor Lyon, 2009
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Gordon Fyodor Lyon, 2009
Rethinking Trafficking in Women: Politics Out of Security
Claudia Aradau, 2008
Rethinking Trafficking in Women: Politics out of Security
Claudia Aradau (auth.), 2008
Security in Computing
Charles P. Pfleeger, 2007
Security in Computing
Charles P., 2002
Disobeying the Security Council: Countermeasures against Wrongful Sanctions
Antonios Tzanakopoulos, 2011
