نتایج جستجو
Introduction to Computer Security: Pearson New International Edition
Michael Goodrich, Roberto Tamassia, 2014
Passwords: Philology, Security, Authentication
Brian Lennon, 2018
International Security and Estonia 2018
Estonian Foreign Intelligence Service, 2018
The Law of Security and Title-Based Financing
Hugh Beale; Michael Bridge; Louise Gullifer; Eva Lomnicka, 2018
Design Against Crime - A Human-Centred Approach to Designing for Safety and Security
Caroline L. Davey; Andrew B. Wootton, 2017
Savita Bhabhi - EP 45 - Savita gains a little job security
Savita Bhabhi, -
Aircrew security : a practical guide
Waltrip, Steven; Williams, Clois, 2016
Essential PHP Security
Chris Shiflett
Computer System and Network Security
Gregory B. White, Eric A. Fisch, Udo W. Pooch, 1996
Empirical Research for Software Security: Foundations and Experience
Ben Othmane, Lotfi; Jaatun, Martin Gilje; Weippl, Edgar R, 2018
Form characteristics of regional security organizations : the missing link in the explanation of the democratic peace
Dembinski, Matthias; Freistein, Katja; Weiffen, Brigitte, 2006
Security: A New Framework for Analysis
Barry Buzan, Ole Wæver, Ole Waever, Jaap de Wilde, 1998
New paradigm in understanding food security in Bangladesh: experiences from fieldworks in coastal areas of southwest Bangladesh [article]
Md. Mostafizur Rahman, Mahmud Uz Zaman, 2017
Guide to Network Security
Michael E. Whitman et al., 2012
Bombs, Bugs, Drugs, and Thugs: Intelligence and America’s Quest for Security
Loch K. Johnson, 2002
Hacking Exposed: Industrial Control Systems: ICS and SCADA Security Secrets and Solutions
Clint Bodungen, Bryan Singer, Aaron Shbeeb, Kyle Wilhoit, Stephen Hilt, 2016
Pandemics, Pills, and Politics: Governing Global Health Security
Stefan Elbe, 2018
Security strategies of middle powers in the Asia Pacific
Ralf Emmers; Sarah Teo, 2018
Pro iOS Security and Forensics
Eric Butow, 2018
