نتایج جستجو
Practical internet of things security : design a security framework for an Internet connected ecosystem
Brian Russell; Drew Van Duren, 2018
Android Security Internals: An In-Depth Guide to Android's Security Architecture
Nikolay Elenkov, 2014
Information Security Program Guide: Company Policies, Departmental Procedures, IT Standards & Guidelines
Resource, Cyber Security, 2021
Comptia Security+ Guide to Network Security Fundamentals
Mark Ciampa, 2021
Computer Security – ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021, Proceedings, Part II
Elisa Bertino, Haya Shulman, Michael Waidner, 2021
Core Software Security: Security at the Source
James Ransome, Anmol Misra, 2013
Rights As Security: The Theoretical Basis Of Security Of Person
Rhonda Powell, 2019
Governing Security After War: The Politics of Institutional Change in the Security Sector
Louis-Alexandre Berg, 2022
PRAGMATIC Security Metrics: Applying Metametrics to Information Security
W. Krag Brotby, Gary Hinson, 2013
Offensive Security - BackTrack to the Max Cracking the Perimeter V
Offensive Security, 2008
CIS Critical Security Controls
Center for Internet Security, 2021
Terrorism: Commentary on Security Documents Volume 147: Assessing the 2017 U.S. National Security Strategy
Douglas C. Lovelace Jr. (editor), 2018
Connected Places: cyber security principles.
National Cyber Security Centre
Victims as Security Threats: Refugee Impact on Host State Security in Africa
Edward Mogire, 2016
International Conflicts in Cyberspace - Battlefield of the 21st Century: Cyber Attacks at State Level, Legislation of Cyber Conflicts, Opposite Views by Different Countries on Cyber Security Control & Report on the Latest Case of Russian Hacking of Government Sectors
U. S. Department Of Defense; Strategic Studies Institute; United States Army War College; Department Of Homeland Security; Federal Bureau Of Investigation, 2017
Rethinking Energy Security in Asia: A Non-Traditional View of Human Security
Mely Caballero-Anthony, Swee Lean Collin Koh (auth.), Mely Caballero-Anthony, Youngho Chang, Nur Azha Putra (eds.), 2012
Building Security in Post-Conflict States: The Domestic Consequences of Security Sector Reform
Ursula C. Schroeder, Fairlie Chappuis, 2015
Security Analytics: A Data Centric Approach to Information Security
Mehak Khurana, Shilpa Mahajan, 2022
Climate Security in the Anthropocene: Exploring the Approaches of United Nations Security Council Member-States
Judith Nora Hardt, Cameron Harrington, Franziskus von Lucke, Adrien Estève, Nick P. Simpson, 2023
Network Security All-in-one: ASA Firepower WSA Umbrella VPN ISE Layer 2 Security
Redouane MEDDANE, 2022
Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part I (Lecture Notes in Computer Science)
Gene Tsudik (editor), Mauro Conti (editor), Kaitai Liang (editor), Georgios Smaragdakis (editor), 2024
