نتایج جستجو
Advances in Security Technology: International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers
Wen-Chung Kuo (auth.), Haeng-kon Kim, Tai-hoon Kim, Akingbehin Kiumi (eds.), 2009
Cloud Computing and Security: First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers
Zhiqiu Huang, Xingming Sun, Junzhou Luo, Jian Wang (eds.), 2015
Computer Security and Industrial Cryptography: State of the Art and Evolution ESAT Course, Leuven, Belgium, May 21–23, 1991
Prof. Dr. B. De Schutter (auth.), Bart Preneel, René Govaerts, Joos Vandewalle (eds.), 1993
CompTIA Security+ Certification Study Guide, Third Edition: Exam SY0-201 3E
Ido Dubrawsky, 2009
CompTIA Security+ Certification Study Guide, Third Edition: Exam SY0-201 3E
Ido Dubrawsky, Jeremy Faircloth, 2009
Eleventh Hour Security+: Exam SY0-201 Study Guide
Ido Dubrawsky, 2009
Security+
Ido Dubrawsky (Auth.), 2007
Environmental Security and Public Safety: Problems and Needs in Conversion Policy and Research after 15 Years of Conversion in Central and Eastern Europe
Alexander Döring Dipl. Eng. (auth.), Wolfgang Spyra, Michael Katzsch (eds.), 2007
Communications and Multimedia Security. Advanced Techniques for Network and Data Protection: 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003. Proceedings
Alwyn Goh, David C. L. Ngo (auth.), Antonio Lioy, Daniele Mazzocchi (eds.), 2003
Communications and Multimedia Security. Advanced Techniques for Network and Data Protection: 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003. Proceedings
Alwyn Goh, David C. L. Ngo (auth.), Antonio Lioy, Daniele Mazzocchi (eds.), 2003
Computational Intelligence in Information Assurance and Security
E. C. Laskari, G. C. Meletiou (auth.), Nadia Nedjah, Ajith Abraham, Luiza de Macedo Mourelle (eds.), 2007
Computational Social Networks: Security and Privacy
Mostafa Salama, Mrutyunjaya Panda, Yomna Elbarawy, Aboul Ella Hassanien, Ajith Abraham (auth.), Ajith Abraham (eds.), 2012
Cryptography & Network Security (McGraw-Hill Forouzan Networking)
Behrouz Forouzan, 2007
Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification: First International Conference, RSSRail 2016, Paris, France, June 28-30, 2016, Proceedings
Thierry Lecomte, Ralf Pinger, Alexander Romanovsky (eds.), 2016
American Biodefense: How Dangerous Ideas about Biological Weapons Shape National Security
Frank L. Smith III, 2014
Network Security with OpenSSL
John Viega, Matt Messier, Pravir Chandra, 2002
Network Security with OpenSSL
John Viega, Matt Messier, Pravir Chandra, 2002
Network Security with OpenSSL
John Viega, Matt Messier, Pravir Chandra, 2002
Enterprise Mac Security: Mac OS X Snow Leopard
Charles Edge, William Barker, Beau Hunter, Gene Sullivan, 2010
Enterprise Mac Security: Mac OS X Snow Leopard
Charles Edge, William Barker, Beau Hunter, Gene Sullivan (auth.), 2010
Enterprise Mac Security: Mac OS X Snow Leopard, 2nd Edition
Charles Edge, William Barker, Beau Hunter, Gene Sullivan, 2010
Security Technology: International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings
Ju-Sung Kang, Dowon Hong (auth.), Tai-hoon Kim, Hojjat Adeli, Wai-chi Fang, Javier García Villalba, Kirk P. Arnett, Muhammad Khurram Khan (eds.), 2011
