نتایج جستجو
Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications
Yan Zhang, Laurence T. Yang, Jianhua Ma, 2008
Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications
Yan Zhang, Laurence T. Yang, Jianhua Ma, 2008
Body of Secrets: Anatomy of the Ultra-Secret National Security Agency
James Bamford, 2001
Cyber-War: The Anatomy of the global Security Threat
Julian Richards (auth.), 2014
Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial Lectures
Santiago Escobar, Catherine Meadows, José Meseguer (auth.), Alessandro Aldini, Gilles Barthe, Roberto Gorrieri (eds.), 2009
Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial Lectures
Santiago Escobar, Catherine Meadows, José Meseguer (auth.), Alessandro Aldini, Gilles Barthe, Roberto Gorrieri (eds.), 2009
Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial Lectures
Santiago Escobar, Catherine Meadows, José Meseguer (auth.), Alessandro Aldini, Gilles Barthe, Roberto Gorrieri (eds.), 2009
Black Hat Physical Device Security: Exploiting Hardware and Software
Drew Miller, Rob Shein, Michael Bednarczyk, Black Hat Services, 2005
Secure Internet Programming: Security Issues for Mobile and Distributed Objects
Vipin Swarup, Javier Thayer Fábrega (auth.), Jan Vitek, Christian D. Jensen (eds.), 1999
Security and Trust Management: 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings
Sjouke Mauw, Christian Damsgaard Jensen (eds.), 2014
Trust Management II: Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway
Marcin Czenko, Jeroen Doumen, Sandro Etalle (auth.), Yücel Karabulut, John Mitchell, Peter Herrmann, Christian Damsgaard Jensen (eds.), 2008
Certification and Security in E-Services: From E-Government to E-Business
Maurizio Talamo (auth.), Enrico Nardelli, Sabina Posadziejewski, Maurizio Talamo (eds.), 2003
Basic Security Testing with Kali Linux
Daniel W. Dieterle, 2013
Kali Linux: Assuring Security By Penetration Testing
Tedi Heriyanto, Lee Allen, Shakeel Ali, 2014
Kali Linux: Assuring Security by Penetration Testing
Tedi Heriyanto, Lee Allen, Shakeel Ali, 2014
Black Hat Physical Device Security
Drew Miller, 2004
Black Hat physical device security: exploiting hardware and software
Drew Miller, 2005
Black Hat Physical Device Security: Exploiting Hardware and Software
Drew Miller, 2005
Black Hat Physical Device Security: Exploiting Hardware and Software
Drew Miller, 2005
Document Security: Protecting Physical and Electronic Content
Ronald L. Mendell, 2007
Document Security: Protecting Physical and Electronic Content
Ronald L. Mendell, 2007
Effective Physical Security
Lawrence Fennelly (Eds.), 2012
Effective Physical Security, Third Edition
Lawrence Fennelly, 2003
