نتایج جستجو
Transforming settler states: communal conflict and internal security in Northern Ireland and Zimbabwe
Ronald John Weitzer, 1990
Security, Territory, Population: Lectures at the Collège de France 1977--1978
Michel Foucault, 2009
The Trouble with Terror: Liberty, Security and the Response to Terrorism
Tamar Meisels, 2008
The Trouble with Terror: Liberty, Security and the Response to Terrorism
Tamar Meisels, 2008
Simulating Security Returns: A Filtered Historical Simulation Approach
Giovanni Barone Adesi (eds.), 2014
Dynamic Secrets in Communication Security
Sheng Xiao, 2014
Security Access in Wireless Local Area Networks: From Architecture and Protocols to Realization
Prof. Jianfeng Ma, 2009
Java Security
Harpreet Sethi
Nortel Guide to VPN Routing for Security and VoIP
James Edwards, 2006
The Doctrines of US Security Policy: An Evaluation under International Law
Heiko Meiertons, 2010
HP Non: Stop Server Security. A Practical Handbook
Terri Hill, 2004
HP NonStop Server Security: A Practical Handbook
XYPRO Technology Corp, 2003
The United States, China and Southeast Asian Security: A Changing of the Guard?
Wayne Bert (auth.), 2003
The Unlawful Society: Global Crime and Security in a Complex World
Paul Battersby (auth.), 2014
The Transnational Governance of Violence and Crime: Non-State Actors in Security
Anja P. Jakobi, 2013
Professional ASP.NET 2.0 Security, Membership, and Role Management
Stefan Schackow, 2006
