نتایج جستجو
Critical Code: Software Producibility for Defense
Committee for Advancing Software-Intensive Systems Producibility, 2010
Review of the Department of Defense Research Program on Low-Level Exposures to Chemical Warfare Agents
Subcommittee on Toxicologic Assessment of Low-Level Exposures to Chemical Warfare Agents, 2005
Industrial methods for the effective development and testing of defense systems
National Research Council (U.S.). Committee on National Statistics.; National Research Council (U.S.). Board on Army Science, 2012
Women, Enjoyment, and the Defense of Virtue in Boccaccio’s Decameron
Valerio Ferme (auth.), 2015
Real security: converting the defense economy and building peace
Kevin J. Cassidy, 1993
The Middle Eastern Question, or Some Political Problems of Indian Defense
Valentine Chirol, 2007
Antiterrorism and Homeland Defense. Polymers and Materials
John G. Reynolds, Glenn E. Lawson,, 2007
How to Play the Sicilian Defense (The Macmillan Chess Library)
David N. L. Levy, 1987
Mastering the King's Indian Defense
Robert Bellin, 1990
XSS Attacks: Cross Site Scripting Exploits and Defense
Seth Fogie, 2007
XSS Attacks: Cross Site Scripting Exploits and Defense
Seth Fogie, 2007
XSS Attacks: Cross Site Scripting Exploits and Defense
Seth Fogie, 2007
XSS Attacks: Cross Site Scripting Exploits and Defense
Seth Fogie, 2007
Mobile Malware Attacks and Defense
Ken Dunham, 2009
Mobile Malware Attacks and Defense
Ken Dunham, 2008
Mobile Malware Attacks and Defense
Ken Dunham, 2008
The art of computer virus research and defense
Peter Szor, 2005
The art of computer virus research and defense
Peter Szor, 2005
Applications of Information Systems to Homeland Security And Defense
Hussein A. Abbass, 2005
Angel of Death Row: My Life as a Death Penalty Defense Lawyer
Andrea Lyon, 2010
Scandinavian defense : Portuguese variation
John Roush, 1998
