نتایج جستجو
The Complete Guide to E-Security: Protect Your Privacy on the Internet
Michael Cheaboro, 2001
Advanced Power Systems and Security: Computer Aided Design
Samir Ibrahim Abood (editor), Muna Hamid Fayyadh (editor)
State, Security, and Subject Formation
Anna Yeatman; Magdalena Zolkos (editors), 2010
Security and Privacy Schemes for Dense 6G Wireless Communication Networks
Agbotiname Lucky Imoize, Chandrashekhar Meshram, Dinh-Thuan Do, Seifedine Kadry and Lakshmanan Muthukaruppan, 2023
Hardware Security Training, Hands-on!
Mark Tehranipoor, N. Nalla Anandakumar, Farimah Farahmandi, 2023
Lethal Racism. Extrajudicial Executions and Unlawful Use of Force by Peru's Security Forces
Amnesty International/ Amnistía Internacional, 2023
Space-Air-Ground Integrated Network Security
Jianwei Liu, Lin Bai, Chunxiao Jiang, Wei Zhang, 2023
Zero Trust Architecture (Networking Technology: Security)
Cindy Green-Ortiz, Brandon Fowler, David Houck, Hank Hensel, Patrick Lloyd, Andrew McDonald, Jason Frazier, 2023
Zero Trust Architecture (Networking Technology: Security)
Cindy Green-Ortiz, Brandon Fowler, David Houck, Hank Hensel, Patrick Lloyd, Andrew McDonald, Jason Frazier, 2023
High Security Lock Standards and Forced Entry: A Primer
Marc Weber Tobias, 2007
Spring Security in Action, Second Edition (MEAP V06)
Perry Lea, 2023
Artificial Intelligence and Cyber Security in Industry 4.0
Velliangiri Sarveshwaran, Joy Iong-Zong Chen, Danilo Pelusi, 2023
Codes, Cryptology and Information Security. 4th International Conference, C2SI 2023 Rabat, Morocco, May 29–31, 2023 Proceedings
Said El Hajji, Sihem Mesnager, El Mamoun Souidi, 2023
Docker Security: Using Containers Safely in Production
Adrian Mouat, 2015
Security Empire
Molly Pucci;, 2020
German Foreign and Security Policy
Leah N. Bowers, 2009
Southern and Postcolonial Perspectives on Policing, Security and Social Order
Roxana Pessoa Cavalcanti (editor), Peter Squires (editor), Zoha Waseem (editor), 2023
