نتایج جستجو
How to Develop and Implement a Security Master Plan
Giles T, 2009
EU-Russian Border Security: Challenges, (Mis)Perceptions and Responses
Serghei Golunov, 2016
Security, Trust and Privacy Models, and Architectures in IoT Environments
Lidia Fotia, Fabrizio Messina, Domenico Rosaci, Giuseppe M.L. Sarné, 2023
Innovative Security Solutions for Information Technology and Communications: 15th International Conference, SecITC 2022, Virtual Event, December 8–9, Revised Selected Papers
Giampaolo Bella, Mihai Doinea, Helge Janicke, 2023
Principles of Information Security
Michael E. Whitman, Herbert J. Mattord, 2022
A Comprehensive Guide to Safety and Aging: Minimizing Risk, Maximizing Security
Barry S. Eckert, Robert Wolf, Amy R. Ehrlich, 2023
AI-Based Metaheuristics for Information Security and Digital Media (Advances in Metaheuristics)
Apoorva S Shastri (editor), Mangal Singh (editor), Anand J. Kulkarni (editor), Patrick Siarry (editor), 2023
Information Security and Privacy in Smart Devices: Tools, Methods, and Applications
Carlos Rabadão, Leonel Santos, Rogério Luís de Carvalho Costa, 2023
Foreign Policy in Post-Apartheid South Africa: Security, Diplomacy and Trade
Adekeye Adebajo; Kudrat Virk, 2018
CAD for Hardware Security
Farimah Farahmandi, M. Sazadur Rahman, Sree Ranjani Rajendran, Mark Tehranipoor, 2023
Business Continuity and Disaster Recovery Plan for Information Security
Vyshnavi Devi Jorrigala, 2018
User-Centric Privacy and Security in Biometrics
Claus Vielhauer, 2017
Applied Cryptography and Network Security: 21st International Conference, ACNS 2023, Kyoto, Japan, June 19–22, 2023, Proceedings, Part II
Mehdi Tibouchi, XiaoFeng Wang, 2023
Israel: National Security and Securitization: The Role of the United States in Defining What Counts
Ori Wertman, Christian Kaunert, 2023
Politics of Hybrid Warfare: The Remaking of Security in Czechia after 2014
Jakub Eberle, Jan Daniel, 2023
CAD for Hardware Security
Farimah Farahmandi, M. Sazadur Rahman, Sree Ranjani Rajendran, Mark Tehranipoor, 2023
Credit and Security in Thailand
Chitti Tingsabadh, David E. Allan, Mary E. Hiscock, Derek Roebuck, 1974
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
Jasper van Woudenberg; Colin O'Flynn, 2021
