نتایج جستجو
Security for Web Services and Service-Oriented Architectures
Elisa Bertino, 2010
EU Security and Justice Law: After Lisbon and Stockholm
Diego Acosta Arcarazo, 2014
Transmission Grid Security: A PSA Approach
Liisa Haarla, 2011
Web Services Security and E-business
G. Radhamani, 2007
The art of deception : controlling the human element of security
Kevin D Mitnick, 2002
The art of deception: controlling the human element of security
Kevin D. Mitnick, 2003
The art of deception: controlling the human element of security
Kevin D. Mitnick, 2003
The Art of Deception: Controlling the Human Element of Security
Kevin D. Mitnick, 2002
The Art of Deception: Controlling the Human Element of Security
Kevin D. Mitnick, 2002
The Art of Deception: Controlling the Human Element of Security
Kevin D.Mitnick, 2002
The Art of Deception: Controlling the Human Element of Security
Kevin D.Mitnick, 2002
The Art of Deception: Controlling the Human Element of Security
Kevin D. Mitnick, 2002
Information Systems Security: 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings
Christopher Kruegel (auth.), 2012
Security Protocols: 6th International Workshop Cambridge, UK, April 15–17, 1998 Proceedings
Lawrence C. Paulson (auth.), 1999
Security Protocols: 6th International Workshop Cambridge, UK, April 15–17, 1998 Proceedings
Lawrence C. Paulson (auth.), 1999
Security+ Training Guide
Todd King, 2003
Security+ training guide
Todd King
Network Security Policies and Procedures
Douglas W. Frye, 2007
Network Security Policies and Procedures
Douglas W. Frye (auth.), 2007
