نتایج جستجو
Applied Computation and Security Systems: Volume One
Rituparna Chaki, Khalid Saeed, Sankhayan Choudhury, Nabendu Chaki (eds.), 2015
Applied Computation and Security Systems: Volume Two
Rituparna Chaki, Khalid Saeed, Sankhayan Choudhury, Nabendu Chaki (eds.), 2015
Wireless Personal Area Networks: Performance, Interconnection, and Security with IEEE 802 15 4
Jelena Misic, Vojislav Misic, 2008
Wireless Personal Area Networks: Performance, Interconnection, and Security with IEEE 802.15.4
Jelena Misic, Vojislav Misic, 2008
Wireless Personal Area Networks: Performance, Interconnection, and Security with IEEE 802.15.4
Jelena Misic, Vojislav Misic, 2008
Wireless Personal Area Networks: Performance, Interconnection, and Security with IEEE 802.15.4
Jelena Misic, Vojislav Misic, 2008
Wireless Personal Area Networks: Performance, Interconnections and Security with IEEE 802.15.4
Jelena Misic, Vojislav B. Misic(auth.), Xuemin (Sherman) Shen, Yi Pan(eds.), 2008
Security and Privacy in Mobile Information and Communication Systems (LNICST, 47)
Andreas U. Schmidt, Giovanni Russello, Antonio Lioy, Neeli R. Prasad, Shiguo Lian, 2011
TErrestrial Trunked RAdio - TETRA: A Global Security Tool (Signals and Communication Technology)
Peter Stavroulakis, 2007
Building an Effective Information Security Policy Architecture
Sandy Bacik, 2008
Building an Effective Information Security Policy Architecture
Sandy Bacik, 2008
Building and implementing a security certification and accreditation program: official
Patrick D. Howard, 2006
Conflict and Reconstruction in Multiethnic Societies: Proceedings of a Russian-American Workshop
Committee on Conflict and Reconstruction in Multiethnic Societies, Security, and Cooperation Office for Central Europe and Eurasia Development, National Research Council, 2004
Foundations of Security Analysis and Design VII: FOSAD 2012/2013 Tutorial Lectures
Alessandro Aldini, Javier Lopez, Fabio Martinelli (eds.), 2014
Security Communities (Cambridge Studies in International Relations)
Emanuel Adler, Michael Barnett, 1998
Complexity and Security (Nato Science for Peace and Series) (Nato Science for Peace and Series)
Jeremy J. Ramsden, Paata J. Kervalishvili
Taiwan's Maritime Security
Martin Edmonds, Michael M. Tsai, 2003
A Human Readable Guide to Cyber Security
Dane Christian, 2015
Network and System Security: 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings
Yuxin Meng, Lam-for Kwok (auth.), Li Xu, Elisa Bertino, Yi Mu (eds.), 2012
Climate Change and Food Security in West Asia and North Africa
Mannava V. K. Sivakumar, Alex C. Ruane, Jose Camacho (auth.), Mannava V.K. Sivakumar, Rattan Lal, Ramasamy Selvaraju, Ibrahim Hamdan (eds.), 2013
A classical introduction to cryptography : applications for communications security
Vaudenay, Serge, 2005
