نتایج جستجو
Linux Security Cookbook
Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes, 2003
Linux Security Cookbook
Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes, 2003
Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors
Anthony Reyes, Richard Brittson, Kevin O'Shea, Jim Steel,, 2007
Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors
Anthony Reyes, Richard Brittson, Kevin O'Shea, Jim Steel,, 2007
Climate Change and Food Security: Adapting Agriculture to a Warmer World
David Lobell, Marshall Burke (auth.), David Lobell, Marshall Burke (eds.), 2010
Climate Change and Food Security: Adapting Agriculture to a Warmer World
David Lobell, Marshall Burke (auth.), David Lobell, Marshall Burke (eds.), 2010
Nuclear Power Plant Instrumentation and Control Systems for Safety and Security
Michael Yastrebenetsky, Vyacheslav Kharchenko, 2014
A Classical Introduction to Cryptography - Applications for Communications Security
Serge Vaudenay, 2005
A Classical Introduction to Cryptography: Applications for Communications Security
Serge Vaudenay, 2005
A Classical Introduction to Cryptography: Applications for Communications Security
Serge Vaudenay, 2005
Designing Security Architecture Solutions
Jay Ramachandran, 2002
Public Security in the Negotiated State: Policing in Latin America and Beyond
Markus-Michael Müller (auth.), 2012
Contemporary Security and Strategy
Craig Snyder, 1999
Information Age Anthology: National Security Implications of the Information Age (Volume II)
David S. Alberts, Daniel S. Papp, 2000
Atmospheric Boundary Layers: Nature, Theory and Applications to Environmental Modelling and Security
Alexander Baklanov, Branko Grisogono, A. Baklanov, B. Grisogono, 2010
Atmospheric Boundary Layers: Nature, Theory and Applications to Environmental Modelling and Security
Alexander Baklanov, Branko Grisogono (auth.), Alexander Baklanov, Branko Grisogono (eds.), 2007
Atmospheric Boundary Layers: Nature, Theory, and Application to Environmental Modelling and Security
Alexander Baklanov, Branko Grisogono, 2007
Advances in Cryptology - ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings
Duong Hieu Phan, David Pointcheval (auth.), Chi-Sung Laih (eds.), 2003
Advances in Cryptology - ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings
Martin Hirt, Ueli Maurer, Vassilis Zikas (auth.), Josef Pieprzyk (eds.), 2008
Advances in Cryptology - ASIACRYPT’99: International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November 14-18, 1999. Proceedings
Kenji Koyama, Yukio Tsuruoka, Noboru Kunihiro (auth.), Kwok-Yan Lam, Eiji Okamoto, Chaoping Xing (eds.), 1999
Advances in Cryptology – ASIACRYPT 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings
Christophe De Cannière, Christian Rechberger (auth.), Xuejia Lai, Kefei Chen (eds.), 2006
Advances in Cryptology – ASIACRYPT 2007: 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings
Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen K. Lenstra, Dag Arne Osvik (auth.), Kaoru Kurosawa (eds.), 2007
