نتایج جستجو
Managing risk and information security : protect to enable
Harkins, Malcolm, 2013
Managing Risk and Information Security: Protect to Enable
Malcolm Harkins, 2012
Managing Risk and Information Security: Protect to Enable
Malcolm Harkins (auth.), 2013
Managing Risk and Information Security: Protect to Enable
Malcolm Harkins, 2012
Information and Communications Security: 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006. Proceedings
Chae Hoon Lim, Taekyoung Kwon (auth.), Peng Ning, Sihan Qing, Ninghui Li (eds.), 2006
Information Security and Cryptology – ICISC 2012: 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers
Thore Graepel, Kristin Lauter, Michael Naehrig (auth.), Taekyoung Kwon, Mun-Kyu Lee, Daesung Kwon (eds.), 2013
Information Security Applications: 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers
Junghyun Nam, Seungjoo Kim, Dongho Won (auth.), Joo-Seok Song, Taekyoung Kwon, Moti Yung (eds.), 2006
Information Security Applications: 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers
Junghyun Nam, Seungjoo Kim, Dongho Won (auth.), Joo-Seok Song, Taekyoung Kwon, Moti Yung (eds.), 2006
Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004. Proceedings
Taekyoung Kwon (auth.), Kan Zhang, Yuliang Zheng (eds.), 2004
Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004. Proceedings
Taekyoung Kwon (auth.), Kan Zhang, Yuliang Zheng (eds.), 2004
Body Area Networks: Safety, Security, and Sustainability
Professor Sandeep K. S. Gupta, Dr Tridib Mukherjee, Dr Krishna Kumar Venkatasubramanian, 2013
Advances in Cryptology – ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings
Alex Biryukov, Dmitry Khovratovich (auth.), Mitsuru Matsui (eds.), 2009
A System-Aware Cyber Security architecture
Rick A Jones Affiliation: Systems and Information Engineering, University of Virginia, Charlottesville, VA 22904; Barry Horowitz Affiliation: Systems and Information Engineering, University of Virginia, Charlottesville, VA 22904, 2011
Access Contested. Security, Identity, and Resistance in Asian Cyberspace
Ronald Deibert,John Palfrey,Rafal Rohozinski, et al.MIT Press|MIT Press||Adult NonfictionComputer TechnologyLanguage(s): EnglishOn sale date: 05.06.2012Street date: 05.06.2012, 2012
Access Contested: Security, Identity, and Resistance in Asian Cyberspace
Ronald Deibert, John Palfrey, Rafal Rohozinski, Jonathan Zittrain, 2011
CISSP: Certified Information Systems Security Professional Study Guide
James M. Stewart, Ed Tittel, Mike Chapple, 2011
Critical Infrastructure System Security and Resiliency
Betty E Biringer, 2013
Double Trouble: Iran and North Korea as Challenges to International Security
Patrick M. Cronin, 2007
High-rise security and fire life safety
Geoff Craighead, 2003
