نتایج جستجو
String Analysis for Software Verification and Security
Tevfik Bultan, Fang Yu, Muath Alkhalaf, Abdulbaki Aydin, 2017
Introduction to Homeland Security
Keith G. Logan, James D. Ramsay, 2012
CompTIA Security+ SY0-401 Cert Guide, Deluxe Edition
David L. Prowse, 2015
Information Security and IT Risk Management
Manish Agrawal, Alex Campoe, Eric Pierce
RFID Protocol Design, Optimization and Security for the Internet of Things
Alex X. Liu, Keqiu Li, Muhammad Shahzad, Xiulong Liu, 2017
Chasing Dragons: Security, Identity, and Illicit Drugs in Canada
Kyle Grayson, 2008
Applied Network Security: Proven tactics to detect and defend against all kinds of network attack
Arthur Salmon, Warun Levesque, Michael McLafferty, 2017
Machine Learning and Security: Protecting Systems with Data and Algorithms
Clarence Chio; David Freeman, 2018
Hardware IP Security and Trust
Prabhat Mishra, Swarup Bhunia, Mark Tehranipoor, 2017
Untangle Network Security
Abd El-Monem A. El-Bawab, 2014
Practical Internet of Things Security
Brian Russell, Drew Van Duren, 2016
Microsoft Azure Security
Roberto Freato, 2015
OpenStack Cloud Security
Fabio Alessandro Locati, 2015
Practical Linux Security Cookbook
Tajinder Kalsi, 2016
Enterprise Mac Security: Mac OS X
Charles S. Edge, Daniel O’Donnell, 2015
Vmware Vcloud Security
Prasenjit Sarkar, 2013
Kali Linux 2 Assuring Security by Penetration Testing
Gerard Johansen, Lee Allen, Tedi Heriyanto, Shakeel Ali, 2016
CCSP(ISC)2 Certified Cloud Security Professional Official Study Guide
O’Hara, Ben Malisow, 2017
Militarizing the Environment: Climate Change and the Security State
Robert P. Marzec, 2015
CCSP Certified Cloud Security Professional All-in-One Exam Guide
Daniel Carter, 2016
Cloud Security Automation
Prashant Priyam, 2018
Ccsp Certified Cloud Security Professional All-In-One Exam Guide
Daniel Carter, 2016
Security of Bangladesh
Md. Shariful Islam, 2016
