نتایج جستجو
Power Dynamics and Regional Security in Latin America
Marcial A.G. Suarez,Rafael Duarte Villa,Brigitte Weiffen (eds.), 2017
Timber Trafficking in Vietnam: Crime, Security and the Environment
Ngoc Anh Cao, (auth.), 2017
European Security in Integration Theory: Contested Boundaries
Kamil Zwolski (auth.), 2018
The Governance of Private Security
Marco Boggero (auth.), 2018
Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers
Michael Brenner,Kurt Rohloff,Joseph Bonneau,Andrew Miller,Peter Y.A. Ryan,Vanessa Teague,Andrea Bracciali,Massimiliano Sala,Federico Pintore,Markus Jakobsson (eds.), 2017
Non-traditional security in Asia : dilemmas in securitization
Acharya, Amitav; Anthony, Mely Caballero; Emmers, Ralf, 2016
Information Security - Solutions Manual
Mark Stamp
Dynamic Games for Network Security
Xiaofan He, Huaiyu Dai, 2018
The Privatization of Israeli Security
Shir Hever, 2018
Social Security 101
Alfred Mill, 2016
Geopolitics and Security in the Arctic
Rolf Tamnes, Kristine Offerdal, 2014
Data security in cloud computing
Kumar, Vimal, 2017
CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide
Darril Gibson, 2014
WordPress Security Made Easy
Niko Guruli, 2017
Contemporary Security Management, Fourth Edition
David Patterson, John Fay, 2017
Security automation with Ansible 2(source code)
Akula, Madhu; Mahajan, Akash, 2017
Security automation with Ansible 2
Akula, Madhu; Mahajan, Akash, 2017
Handbook of Image-based Security Techniques
Shivendra Shivani, Suneeta Agarwal, Jasjit S. Suri, 2018
The alarm, sensor & security circuit cookbook
Petruzzellis, Thomas, 1994
Information Security: The Complete Reference, Second Edition
Mark Rhodes-Ousley, 2013
CompTIA security+ (exam SY0-401)
Dunkerley, Dawn; Meyers, Mike; Samuelle, T. J, 2014
Practical Hadoop security
Lakhe, Bhushan, 2014
Our Germans: Project Paperclip and the National Security State
Brian E. Crim, 2018
