نتایج جستجو
Network Control and Engineering for QoS, Security and Mobility II: IFIP TC6 / WG6.2 & WG6.7 Second International Conference on Network Control and Engineering for QoS, Security and Mobility (Net-Con 2003) October 13–15, 2003, Muscat, Oman
Abderrahim Benslimane, Omar Moussaoui (auth.), Dominique Gaïti, Guy Pujolle, Ahmed Al-Naamany, Hadj Bourdoucen, Lazhar Khriji (eds.), 2003
Network Control and Engineering for QoS, Security and Mobility, III: IFIP TC6 / WG6.2, 6.6, 6.7 and 6.8 Third International Conference on Network Control and Engineering for QoS, Security and Mobility, NetCon 2004 on November 2–5, 2004, Palma de Mallorca, Spain
Rudy Deca, Omar Cherkaoui, Daniel Puche (auth.), Dominique Gaïti, Sebastià Galmés, Ramon Puigjaner (eds.), 2005
Network Control and Engineering for QoS, Security and Mobility, IV: Fourth IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, Lannion, France, November 14–18, 2005
Andrei P. Kirilyuk (auth.), Dominique Gaïti (eds.), 2007
Network Control and Engineering for Qos, Security and Mobility, V: IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20–25, 2006, Santiago, Chile
Xenia Mountrouidou, Vishwas Puttasubbappa (auth.), Dominique Gaïti (eds.), 2006
Network Control and Engineering for QoS, Security and Mobility: IFIP TC6 / WG6.2 & WG6.7 Conference on Network Control and Engineering for QoS, Security and Mobility (Net-Con 2002) October 23–25, 2002, Paris, France
L. Ram Gopal, Man Li (auth.), Dominique Gaïti, Nadia Boukhatem (eds.), 2003
Calculated Risks : Highly Radioactive Waste and Homeland Security (Homeland Security)
Kenneth A. Rogers and Marvin G. Kingsley, 2007
Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers
Ken Barker (auth.), Lachlan M. MacKinnon (eds.), 2012
Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers
Ken Barker (auth.), Lachlan M. MacKinnon (eds.), 2012
Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers
Ken Barker (auth.), Lachlan M. MacKinnon (eds.), 2012
Database and Application Security XV: IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application Security July 15–18, 2001, Niagara on the Lake, Ontario, Canada
Sushil Jajodia, Duminda Wijesekera (auth.), Martin S. Olivier, David L. Spooner (eds.), 2002
Database and Applications Security: Integrating Information Security and Data Management
Bhavani Thuraisingham, 2005
Practical Oracle Security: Your Unauthorized Guide to Relational Database Security
Josh Shaul, Aaron Ingram, 2007
Research Advances in Database and Information Systems Security: IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25–28, 1999, Seattle, Washington, USA
Peng Liu, Sushil Jajodia, Catherine D. McCollum (auth.), Vijay Atluri, John Hale (eds.), 2000
Advances in Information and Computer Security: 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings
Masaya Sato, Toshihiro Yamauchi (auth.), Kazuo Sakiyama, Masayuki Terada (eds.), 2013
Western Balkans Security Observer Vol 5 No. 18 - Ten Years of Security Sector Reform in Serbia
Marko Zilovic, Miroslav Hadzic, Sonja Stojanovic, Filip Ejdus (eds.), 2010
Mergers and Acquisitions Security: Corporate Restructuring and Security Management
Edward Halibozek MBA, Gerald L. Kovacich CFECPPCISSP, 2005
Afghanistan, Arms and Conflict: Armed Groups, Disarmament and Security in a Post-war Society (Contemporary Security Studies)
Michael Vinay Bhatia, Mark Sedra, 2008
Testing Web Security: Assessing the Security of Web Sites and Applications
Steven Splaine, 2002
Information Flow Based Security Control Beyond RBAC: How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)
Klaus-Peter Fischer-Hellmann (auth.), Rainer Bischoff (eds.), 2012
Future of the Nuclear Security Environment in 2015: Proceedings of a Russian-U.S. Workshop
Joint Committees on the Future of the Nuclear Security Environment in 2015, Russian Academy of Sciences, National Research Council, 2009
Applied Cyber Security and the Smart Grid. Implementing Security Controls into the Modern Power Infrastructure
Eric D. Knapp and Raj Samani (Auth.), 2013
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Eric D. Knapp, Raj Samani, 2013
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Eric D. Knapp, Raj Samani, 2013
