نتایج جستجو
Cryptography And Network Security
Atul Kahate, 2007
Gender, Peace and Security in Africa
Cheryl Hendricks, Romi Sigsworth, 2018
Another Look at “Provable Security"
Neal Koblitz, Alfred J. Menezes, 2005
Governing Security: Explorations of Policing and Justice
Clifford D. Shearing; Les Johnston, 2013
Domain Linkages and Privatization in Social Security
Jun-Young Kim, Per-Gunnar Svensson, 2018
The Markets for Force: Privatization of Security Across World Regions
Molly Dunigan (editor), Ulrich Petersohn (editor), 2015
CEH v6 Module 66 Security Convergence.
coll., 2008
High-Security Mechanical Locks: An Encyclopedic Reference
Graham Pulford, 2007
Fedora 11 Security Guide: A Guide to Securing Fedora Linux (Edition 1.0)
Johnray Fuller, John Ha, David O'Brien, Scott Radvan, Eric Christensen, 2008
Introduction to Cyber Security
Jeetendra Pande, 2017
East Asian Security in the Post-Cold War Era
Sheldon W. Simon, 1993
Security in Private Branch IP-Telephony Network with QoS Demands.
Imran Akbar, Khurram Shahzad, 2009
Reassessing Security in the South Caucasus: Regional Conflicts and Transformation
Annie Jafalian (editor), 2011
Database Security
Silviana Castano, 1995
Ethics and Social Security Reform
Erik Schokkaert, 2019
High-rise Security and Fire Life Safety
Geoff Craighead
Digital Agriculture for Food Security and Sustainable Development of the Agro-Industrial Complex
Elena G. Popkova, Bruno S. Sergi, Aleksei V. Bogoviz, Elena I. Semenova, 2023
Security and Privacy in New Computing Environments: 5th EAI International Conference, SPNCE 2022, Xi’an, China, December 30-31, 2022, Proceedings
Qi Jiang, Xinghua Li, Ding Wang, 2023
Embedded Systems Security: Practical Methods for Safe and Secure Software and Systems Development
David Kleidermacher, Mike Kleidermacher, 2012
