نتایج جستجو
Resolving Security Dilemmas: A Constructivist Explanation of the INF Treaty
Brian Frederking, 2000
The TIes That Blind: How the U.S.-Saudi Alliance Damages Liberty and Security
Ted Galen Carpenter; Malou Innocent, 2018
Complex Adaptive Systems, Resilience and Security in Cameroon
Manu Lekunze, 2019
Network Security Architectures (Networking Technology)
Sean Convery, 2004
Security Unbound: Enacting Democratic Limits
Jef Huysmans, 2013
Resilience, Emergencies and the Internet: Security In-Formation
Mareile Kaufmann, 2017
CompTIA® Advanced Security Practitioner (CASP+) CAS-004 Cert Guide
Troy McMillan, 2023
The Problems Of Genocide: Permanent Security And The Language Of Transgression
A. Dirk Moses, 2021
The Future of the United States-Australia Alliance: Evolving Security Strategy in the Indo-Pacific
Scott D. McDonald; Andrew T. H. Tan, 2020
Japan’s “Economic Security” Measures : A Model for Managing China’s Rise
Didi Kirsten Tatlow, Afra Herr, 2022
Enterprise Security: A Data-Centric Approach to Securing the Enterprise
Aaron Woody, 2013
Enterprise Security: A Data-Centric Approach to Securing the Enterprise
Aaron Woody, 2013
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security
Stephen D. Gantz, Daniel R. Philpott, 2012
21st Century Security Officer: Career Guide
D.W. Roach, 2022
Cyber-Security Threats and Response Models in Nuclear Power Plants
Carol Smidts, Indrajit Ray, Quanyan Zhu, Pavan Kumar Vaddi, Yunfei Zhao, Linan Huang, Xiaoxu Diao, Rakibul Talukdar, Michael C. Pietrykowski, 2022
