نتایج جستجو
Cyber warfare : techniques, tactics and tools for security practitioners
Jason Andress, 2011
Computer and information security handbook
John R. Vacca, 2009
Computer and information security handbook
John R. Vacca, 2009
Computer and information security handbook
John R. Vacca, 2009
Ethics and Security in Canadian Foreign Policy
Rosalind Irwin, 2001
International Security and Democracy: Latin America and the Caribbean in the Post-Cold War Era (Pitt Latin American Studies)
Jorge I. Dominguez (ed.), 1998
Effective Security Management, Sixth Edition
Charles A. Sennewald CPP, 2015
Concurrency, Security, and Puzzles: Essays Dedicated to Andrew William Roscoe on the Occasion of His 60th Birthday
Thomas Gibson-Robinson, 2017
How to Cheat at Configuring Open Source Security Tools
Renaud Deraison, 2004
How to Cheat at Configuring Open Source Security Tools
Michael Gregg, 2007
98-367: MTA Security Fundamentals
coll., 2011
Network Security A Beginner’s Guide, Third Edition
Eric Maiwald, 2012
Management of Information Security
Michael E. Whitman, Herbert J. Mattord, 2013
Security in Computing
Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies, 2015
Adapting to Climate Change: An Assessment of Vulnerability and Risks to Human Security in the Western Mediterranean Basin
Dania Abdul Malak, Katriona McGlade, Diana Pascual, Eduard Pla (auth.), 2017
Interoperability, Safety and Security in IoT: Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papers
Nathalie Mitton, Hakima Chaouchi, Thomas Noel, Thomas Watteyne, Alban Gabillon, Patrick Capolsini (eds.), 2017
Information Security of Highly Critical Wireless Networks
Maurizio Martellini, Stanislav Abaimov, Sandro Gaycken, Clay Wilson (auth.), 2017
Information Security and Cryptology – ICISC 2016: 19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papers
Seokhie Hong, Jong Hwan Park (eds.), 2017
Information Systems Security and Privacy: Second International Conference, ICISSP 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers
Olivier Camp, Steven Furnell, Paolo Mori (eds.), 2017
Information Security and Cryptology: 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers
Kefei Chen, Dongdai Lin, Moti Yung (eds.), 2017
Risks and Security of Internet and Systems: 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers
Frédéric Cuppens, Nora Cuppens, Jean-Louis Lanet, Axel Legay (eds.), 2017
Security Einfach Machen: IT-Sicherheit als Sprungbrett für die Digitalisierung
Ferri Abolhassan (eds.), 2017
EU Gas Security Architecture: The Role of the Commission’s Entrepreneurship
Elina Brutschin (auth.), 2016
