نتایج جستجو
A Military History of the Ottomans: From Osman to Ataturk (Praeger Security International)
Mesut Uyar, Edward J Erickson, 2009
Safety and Security Review for the Process Industries. Application of HAZOP, PHA, What-IF and SVA Reviews
Dennis P. Nolan (Auth.), 2011
Sensors for Environment, Health and Security: Advanced Materials and Technologies
Alexander Gaskov, Marina Rumyantseva (auth.), Marie-Isabelle Baraton (eds.), 2009
Access Control Systems: Security, Identity Management and Trust Models
Dr. Messaoud Benantar (auth.), 2006
Wireshark Network Security
Piyush Verma, 2015
Wireshark Network Security
Piyush Verma, 2015
OR, Defence and Security
Roger Forder, 2014
OR, Defence and Security
Roger A Forder (eds.), 2015
A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security
Will Arthur, David Challener, Kenneth Goldman (auth.), 2015
Transactions on data hiding and multimedia security VII
Peter Meerwald, Andreas Uhl (auth.), Yun Q. Shi (eds.), 2012
Information Strategy and Warfare: A Guide to Theory and Practice (Contemporary Security Studies)
John Arquilla, Douglas A. Borer, 2007
Environment and Hope: Improving Health, Reducing AIDS and Promoting Food Security in the World
I. Leslie Rubin, I. Leslie Rubin, Joav Merrick, 2014
Energy Market Experience Learning from the Blackouts: Transmission System Security in Competitive Electricity Markets
International Energy Agency, 2005
Algorithms, architectures and information systems security
Aditya Bagchi, Bhargab B. Bhattacharya, Susmita Sur-kolay, Subhas C. Nandy, 2009
Security in Wireless Mesh Networks
Yan Zhang, Jun Zheng, Honglin Hu, 2008
Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Yan Zhang, Jun Zheng, Honglin Hu, 2008
Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Yan Zhang, Jun Zheng, Honglin Hu, 2008
Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Yan Zhang, Jun Zheng, Honglin Hu, 2008
