نتایج جستجو
Security Intelligence for Broadcast: Algorithmic Complexity
Sumit Chakraborty, 2012
SIVA: Security Intelligence Verification Algorithm for Location based Services
Sumit Chakraborty, 2014
Advances in artificial intelligence for privacy protection and security
Agusti Solanas, Agusti Solanas, Antoni MartÃnez-bal, 2010
A Security Blueprint for Enterprise Networks
Sean Convery, and Bernie Trudel
Advances in Enterprise Information Technology Security
Djamel Khadraoui, Djamel Khadraoui, Francine Herrmann, 2007
Advances in Enterprise Information Technology Security
Mithat Gonen, 2007
.Net Development Security Solutions
John Paul Mueller, 2003
Electronic Payment Systems for E-Commerce (Artech House Computer Security Series)
Donald O'Mahony ,Michael Peirce ,Hitesh Tewari, 2002
Air Mobility: The Key to the United States National Security Strategy (Air University Library,)
Richard J. Hazdra - Major, USAF, 2001
3D Imaging for Safety and Security (Computational Imaging and Vision)
Edited by Andreas Koschan, Marc Pollefeys, Mongi Abidi, 2007
A Matter of Security The Application of Attachment Theory to Forensic Psychiatry and Psychotherapy
Gwen Adshead, Gwen Adshead, Chris Brown, 2003
Beyond Fear Thinking. Sensibly About Security in an UnCertain World
Bruce Schneier, 2003
Information Security and Assurance: International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings
Bilal Khan, Khaled S. Alghathbar (auth.), Tai-hoon Kim, Hojjat Adeli, Rosslin John Robles, Maricel Balitanas (eds.), 2011
Software Networks: Virtualization, SDN, 5G, Security
Guy Pujolle, 2015
Software Networks: Virtualization, SDN, 5G, Security
Guy Pujolle, 2015
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Jan L. Harrington, 2005
A practical guide to security engineering and information assurance
Debra S. Herrmann, 2001
China, Space Weapons, and U.S. Security (Csr)
Bruce W. Macdonald, 2008
Common Security in Outer Space and International Law
Detlev Wolter, 2006
Security for Mobility (Telecommunications)
Chris J. Mitchell, 2003
Security for Multihop Wireless Networks
Shafiullah Khan, Jaime Lloret Mauri, 2014
Cyber Security: Analytics, Technology and Automation
Martti Lehto, Pekka Neittaanmäki, 2015
Disaster Communications in a Changing Media World (Butterworth-Heinemann Homeland Security)
Kim Haddow, George Haddow, 2008
Information and Communications Security: 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings
Bart Preneel (auth.), Miguel Soriano, Sihan Qing, Javier López (eds.), 2010
