نتایج جستجو
Cryptography and Network Security
William Stallings, 2005
Thieves' World: The Threat of the New Global Network of Organized Crime
Claire Sterling, 1994
Virtuous War: Mapping the Military-Industrial-Media-Entertainment Network
James Der Derian, 2009
Virtuous War: Mapping the Military-Industrial-Media-Entertainment Network
James Der Derian, 2009
Users Guide to Physical Modelling and Experimentation: Experience of the HYDRALAB Network
Lynne E. Frostick, 2011
Wireless Network Security
Jonathan Lutz, 2007
WirelessHART™: Real-Time Mesh Network for Industrial Automation
Deji Chen, 2010
The Network Collective: Rise and Fall of a Scientific Paradigm
Prof. Dr med. Dr. h.c. Klaus Eichmann (auth.), 2008
Smart Dust: Sensor Network Applications, Architecture and Design
Mohammad Ilyas, 2006
Smart Dust: Sensor Network Applications, Architecture and Design
Mohammad Ilyas, 2006
The practice of network security monitoring: understanding incident detection and response
Richard Bejtlich, 2013
The practice of network security monitoring: understanding incident detection and response
Richard Bejtlich, 2013
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
Richard Bejtlich, 2013
The Family, Clan, and Tribal Dynamics of Saddam's Security and Intelligence Network
Ibrahim AL-MARASHI, 2003
