نتایج جستجو
Transportation security. / Volume 9, Guidelines for transportation emergency training exercises
McCormick Taylor (Firm);United States. Federal Transit Administration.;United States. Federal Highway Administration.;National Research Council (U.S.). Transportation Research Board.;National Cooperative Highway Research Program.;All authors, 2006
Emerging Management Mechanisms for the Future Internet: 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, Barcelona, Spain, June 25-28, 2013. Proceedings
Vitor Pereira, Miguel Rocha, Paulo Cortez, Miguel Rio, Pedro Sousa (auth.), Guillaume Doyen, Martin Waldburger, Pavel Čeleda, Anna Sperotto, Burkhard Stiller (eds.), 2013
Hitler’s Personal Security
Peter Hoffmann (auth.), 1979
Advanced Computing, Networking and Security: International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011, Revised Selected Papers
Abhishek Parakh, Subhash Kak (auth.), P. Santhi Thilagam, Alwyn Roshan Pais, K. Chandrasekaran, N. Balakrishnan (eds.), 2012
Availability, Reliability and Security for Business, Enterprise and Health Information Systems: IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, ARES 2011, Vienna, Austria, August 22-26, 2011. Proceedings
Jostein Jensen (auth.), A Min Tjoa, Gerald Quirchmayr, Ilsun You, Lida Xu (eds.), 2011
Certification and Security in Health-Related Web Applications: Concepts and Solutions
Anargyros Chryssanthou, Ioannis Apostolakis, Iraklis Varlamis, 2010
Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings
Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi (auth.), Sara Foresti, Sushil Jajodia (eds.), 2010
Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings
Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi (auth.), Sara Foresti, Sushil Jajodia (eds.), 2010
Data and Applications Security and Privacy XXV: 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings
R. Sekar (auth.), Yingjiu Li (eds.), 2011
Data and Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings
Leendert van der Torre (auth.), Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia-Alfaro (eds.), 2012
Data and Applications Security and Privacy XXVIII: 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings
Vijay Atluri, Günther Pernul (eds.), 2014
Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings
Joachim Biskup, Jens Seiler, Torben Weibert (auth.), Ehud Gudes, Jaideep Vaidya (eds.), 2009
Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings
Joachim Biskup, Jens Seiler, Torben Weibert (auth.), Ehud Gudes, Jaideep Vaidya (eds.), 2009
Developer's Guide to Web Application Security
Michael Cross, 2007
Developer's Guide to Web Application Security
Michael Cross, 2007
Developer's guide to web application security
Michael Cross, 2007
Developer's Guide to Web Application Security
Michael Cross, 2007
Future Data and Security Engineering: First International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings
Tran Khanh Dang, Roland Wagner, Erich Neuhold, Makoto Takizawa, Josef Küng, Nam Thoai (eds.), 2014
Java Security Solutions
Rich Helton, Johennie Helton, 2002
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
Tobias Klein, 2011
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
Tobias Klein, 2011
Building Global Security Through Cooperation: Annals of Pugwash 1989
Richard Garwin (auth.), Professor Dr. Joseph Rotblat, Professor John P. Holdren (eds.), 1990
A Theory of Security Strategy for Our Time: Defensive Realism
Shiping Tang, 2010
A Theory of Security Strategy for Our Time: Defensive Realism
Shiping Tang (auth.), 2010
