نتایج جستجو
Wireless Personal Area Networks: Performance, Interconnections and Security with IEEE 802.15.4
Jelena Misic, Vojislav B. Misic(auth.), Xuemin (Sherman) Shen, Yi Pan(eds.), 2008
Security and Privacy in Mobile Information and Communication Systems (LNICST, 47)
Andreas U. Schmidt, Giovanni Russello, Antonio Lioy, Neeli R. Prasad, Shiguo Lian, 2011
TErrestrial Trunked RAdio - TETRA: A Global Security Tool (Signals and Communication Technology)
Peter Stavroulakis, 2007
Building an Effective Information Security Policy Architecture
Sandy Bacik, 2008
Building an Effective Information Security Policy Architecture
Sandy Bacik, 2008
Building and implementing a security certification and accreditation program: official
Patrick D. Howard, 2006
Conflict and Reconstruction in Multiethnic Societies: Proceedings of a Russian-American Workshop
Committee on Conflict and Reconstruction in Multiethnic Societies, Security, and Cooperation Office for Central Europe and Eurasia Development, National Research Council, 2004
Foundations of Security Analysis and Design VII: FOSAD 2012/2013 Tutorial Lectures
Alessandro Aldini, Javier Lopez, Fabio Martinelli (eds.), 2014
Complexity and Security (Nato Science for Peace and Series) (Nato Science for Peace and Series)
Jeremy J. Ramsden, Paata J. Kervalishvili
Taiwan's Maritime Security
Martin Edmonds, Michael M. Tsai, 2003
A Human Readable Guide to Cyber Security
Dane Christian, 2015
Network and System Security: 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings
Yuxin Meng, Lam-for Kwok (auth.), Li Xu, Elisa Bertino, Yi Mu (eds.), 2012
Climate Change and Food Security in West Asia and North Africa
Mannava V. K. Sivakumar, Alex C. Ruane, Jose Camacho (auth.), Mannava V.K. Sivakumar, Rattan Lal, Ramasamy Selvaraju, Ibrahim Hamdan (eds.), 2013
A classical introduction to cryptography : applications for communications security
Vaudenay, Serge, 2005
A Classical Introduction to Cryptography: Applications for Communications Security
Serge Vaudenay, 2005
A Classical Introduction to Cryptography: Applications for Communications Security
Serge Vaudenay (auth.), 2006
Applied Cryptography and Network Security: 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings
Ioana Boureanu, Philippe Owesarski, Serge Vaudenay (eds.), 2014
Cryptology and Network Security: 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings
Asli Bay, Jorge Nakahara Jr., Serge Vaudenay (auth.), Swee-Huay Heng, Rebecca N. Wright, Bok-Min Goi (eds.), 2010
Cryptology and Network Security: 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings
Asli Bay, Jorge Nakahara Jr., Serge Vaudenay (auth.), Swee-Huay Heng, Rebecca N. Wright, Bok-Min Goi (eds.), 2010
Information Security and Cryptology - ICISC’99: Second International Conference Seoul, Korea, December 9-10, 1999 Proceedings
Serge Vaudenay (auth.), JooSeok Song (eds.), 2000
Information Security and Cryptology - ICISC’99: Second International Conference Seoul, Korea, December 9-10, 1999 Proceedings
Serge Vaudenay (auth.), JooSeok Song (eds.), 2000
