نتایج جستجو
Terrorism and Homeland Security
Jonathan R. White, 2012
Internet security for your Macintosh : a guide for the rest of us
Oppenheimer, Alan B.; Whitaker, Charles H., 2001
Security Without Obscurity: A Guide to Confidentiality, Authentication, and Integrity
Jeffrey James Stapleton, 2014
Urban Water Security
Robert C Brears, 2016
CPTED and traditional security countermeasures : 150 things you should know
Fennelly, Lawrence J.; Perry, Marianna A, 2018
Flexible Network Architectures Security : Principles and Issues
Rudra, Bhawana, 2018
Handbook of Image-based Security Techniques
Agarwal, Suneeta; Shivani, Shivendra; Suri, Jasjit S, 2018
Handbook of Image-Based Security Techniques
Shivendra Shivani; Suneeta Agarwal; Jasjit S Suri, 2018
Oil Exploration, Diplomacy, and Security in the Early Cold War: The Enemy underground
Roberto Cantoni, 2017
CANSO Cyber Security and Risk Assessment Guide
coll., 2014
Computer Security: Principles and Practice
Stallings, William; Brown, Lawrie, 2018
Security in Computing
Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies, 2105
Computer security: Principles and Practice
William Stallings, Lawrie Brown, 2015
Brown Threat: Identification in the Security State
Kumarini Silva, 2016
Artificial intelligence safety and security
Yampolskiy, Roman V., 2018
The Complete Cyber Security Course - Volume 1
Nathan House
Fail-Safe Investing: Lifelong Financial Security in 30 Minutes
Harry Browne, 1999
Settlement, Market and Food Security
OECD, 2013
Spring Security
Robert Winch Mick Knutson Peter Mularien, 2017
Defining Value Based Information Security Governance
Sushma Mishra, 1995
The Routledge Companion to Risk, Crisis and Security in Business
Engemann, Kurt J., 2018
