نتایج جستجو
Space security 2010
Jaramillo, Cesar, 2010
Instant Citrix Security How-to
Jacob, Carmel, 2013
Pro ASP.NET web API security : securing ASP.NET web API
Lakshmiraghavan, Badrinarayanan, 2013
Power Dynamics and Regional Security in Latin America
Marcial A.G. Suarez, Rafael Duarte Villa, Brigitte Weiffen, 2017
Building Food Security and Managing Risk in Southeast Asia (Volume 2017)
Organization for Economic Cooperation and Development, 2017
The Kish Cypher:The Story of KLJN for Unconditional Security
Laszlo B. Kish, 2017
Security, Territory, Population: Lectures at the College De France, 1977–78
Michel Senellart, François Ewald, Alessandro Fontana (eds.), 2009
Security Strategies in the Asia-Pacific: The United States’ “Second Front” in Southeast Asia
Andrew T. H. Tan (auth.), 2011
The Dynamics Of European Security Cooperation, 1945–91
Gülnur Aybet (auth.), 1997
Expanding the Zone of Peace?: Democratization and International Security
Alexander V. Kozhemiakin (auth.), 1998
National Security under the Obama Administration
Bahram M. Rajaee, Mark J. Miller (eds.), 2012
Economic Instruments of Security Policy: Influencing Choices of Leaders
Gary M. Shiffman, James J. Jochum (auth.), 2011
Subjects of Security: Domestic Effects of Foreign Policy in the War on Terror
Robin Cameron (auth.), 2013
Macroeconomic Variables and Security Prices in India during the Liberalized Period
Tarak Nath Sahu (auth.), 2015
U.S. Foreign Policy and European Security
Arthur Cyr (auth.), 1987
Third-World Conflict and International Security
Christoph Bertram (eds.), 1982
Public Opinion and National Security in Western Europe: Consensus Lost?
Richard C. Eichenberg (auth.), 1989
Politics and Security in the Southern Region of the Atlantic Alliance
Douglas T. Stuart (eds.), 1988
Artificial Intelligence and National Security
Greg Allen; Taniel Chan, 2017
Police Encounters: Security and Surveillance in Gaza under Egyptian Rule
Ilana Feldman, 2015
Guideline for a healthy information system: strengthen information system security in 42 measures
Agence nationale de la sécurité des systèmes d’information, 2017
Kali Linux 2 Assuring Security by Penetration Testing
Gerard Johansen, Lee Allen, Tedi Heriyanto, Shakeel Ali, 2016
Kali Linux 2 Assuring Security by Penetration Testing
Gerard Johansen, Lee Allen, Tedi Heriyanto, Shakeel Ali, 2016
