نتایج جستجو
Rural Water Systems for Multiple Uses and Livelihood Security
M. Dinesh Kumar, Yusuf Kabir, A. J. James, 2016
Intelligent Data Analysis for e-Learning. Enhancing Security and Trustworthiness in Online Learning Systems
Jorge Miguel, Santi Caballé, Fatos Xhafa, 2017
Mobile Security and Privacy. Advances, Challenges and Future Research Directions
Man Ho Au, Raymond Choo, 2016
Microsoft Azure Security Infrastructure
Debra Shinder, Tom Shinder, Yuri Diogenes, 2016
Schneier on Security
Bruce Schneier, 2008
Non-Traditional Security Issues in North Korea
Kyung-Ae Park, Min Sun Kim, 2013
Fuzzing for Software Security Testing and Quality Assurance
Ari Takanen, Jared D. Demott, 2008
The Eurasian Wheat Belt and Food Security: Global and Regional Aspects
Sergio Gomez y Paloma, Sébastien Mary, Stephen Langrell, Pavel Ciaian (eds.), 2017
Food Security and Sustainability: Investment and Financing along Agro-Food Chains
George Mergos, Marina Papanastassiou (eds.), 2017
Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment
Nicolas Sklavos, Ricardo Chaves, Giorgio Di Natale, Francesco Regazzoni (eds.), 2017
Advances in Network Systems : Architectures, Security, and Applications
Maciej Grzenda, Ali Ismail Awad, Janusz Furtak, Jarosław Legierski (eds.), 2017
Environmental Change and Human Security in Africa and the Middle East
Mohamed Behnassi, Katriona McGlade (eds.), 2017
Biometric Security and Privacy: Opportunities & Challenges in The Big Data Era
Richard Jiang, Somaya Al-maadeed, Ahmed Bouridane, Prof. Danny Crookes, Azeddine Beghdadi (eds.), 2017
The Water, Energy, and Food Security Nexus in the Arab Region
Kamel Amer, Zafar Adeel, Benno Böer, Walid Saleh (eds.), 2017
Swords into Market Shares: Technology, Security, and Economics in the New Russia
Glenn E. Schweitzer, 2000
Network Security Essentials: Applications and Standards
William Stallings, 1999
Hacking Exposed Wireless: Wireless Security Secrets & Solutions
Johnny Cache, Joshua Wright, Vincent Liu, 2010
America Inc.?: Innovation and Enterprise in the National Security State
Linda Weiss, 2014
Walling Out the Insiders. Controlling Access to Improve Organizational Security
Michael Erbschloe, 2017
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
Jessey Bullock, Jeff T. Parker, 2017
Wireshark Network Security
Piyush Verma, 2015
