نتایج جستجو
Enterprise Java (TM) Security: Building Secure J2EE (TM) Applications
Brian Sam-Bodden, Christopher M. Judd, 2004
Enterprise Java Security: Building Secure J2EE Applications
Marco Pistoia, Nataraj Nagaratnam, Larry Koved, Anthony Nadalin, 2004
Enterprise Java(TM) Security: Building Secure J2EE(TM) Applications
Marco Pistoia, Nataraj Nagaratnam, Larry Koved, Anthony Nadalin, 2004
Enterprise Mac Security: Mac OS X Snow Leopard
Charles Edge, William Barker, Beau Hunter, Gene Sullivan, 2010
Enterprise Security: The Manager's Defense Guide
David Leon Clark, 2002
Enterprise Web services security
Rickland (Rickland Hollar) Hollar, Richard Murphy, 2006
Implementing Homeland Security for Enterprise IT
Michael Erbschloe, 2003
3D imaging for safety and security
Andreas Koschan, Marc Pollefeys, Mongi Abidi, 2007
3d Imaging for Safety and Security
Andreas Koschan, Marc Pollefeys, Mongi Abidi, 2007
3D Imaging for Safety and Security
Andreas Koschan, Marc Pollefeys, Mongi Abidi, 2007
802.11 Wireless Networks: Security and Analysis
Alan Holt, Chi-Yu Huang (auth.), 2010
802.11 Wireless Networks: Security and Analysis
Alan Holt, Chi-Yu Huang (auth.), 2010
802.11 WLANs and IP networking: security, QoS, and mobility
Neeli Prasad, Anand Prasad, 2005
802.11 WLANs and IP Networking: Security, QoS, and Mobility
Neeli Prasad, Anand Prasad, 2005
802.11 WLANs and IP Networking: Security, QoS, and Mobility
Neeli Prasad, 2005
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
MadjidNakhjiri, Mahsa Nakhjiri, 2005
AAA and network security for mobile access: radius, diameter, EAP, PKI and IP mobility
MadjidNakhjiri, Mahsa Nakhjiri, 2005
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
MadjidNakhjiri, Mahsa Nakhjiri, 2005
Active Defense - A Comprehensive Guide to Network Security
Chris Brenton, Cameron Hunt, 2001
Applied Cryptography and Network Security: 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006. Proceedings
Ahren Studer, Chenxi Wang (auth.), Jianying Zhou, Moti Yung, Feng Bao (eds.), 2006
Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings
Qiong Huang, Duncan S. Wong, Yiming Zhao (auth.), Jonathan Katz, Moti Yung (eds.), 2007
Applied Cryptography and Network Security: 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings
Mark Manulis (auth.), Michel Abdalla, David Pointcheval, Pierre-Alain Fouque, Damien Vergnaud (eds.), 2009
Applied Cryptography and Network Security: First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003. Proceedings
Ventzislav Nikov, Svetla Nikova, Bart Preneel (auth.), Jianying Zhou, Moti Yung, Yongfei Han (eds.), 2003
