نتایج جستجو
Hacking Exposed Wireless, 2nd Edition: Wireless Security Secrets and Solutions
Johnny Cache, Joshua Wright, Vincent Liu, 2010
Hacking Exposed Wireless: Wireless Security Secrets & Solutions
Johnny Cache, Vincent Liu, 2007
Hacking Exposed Wireless: Wireless Security Secrets & Solutions
Johnny Cache, Vincent Liu, 2007
Hacking Exposed Wireless: Wireless Security Secrets & Solutions
Joshua Wright, Johnny Cache, 2014
Hacking Exposed Wireless: Wireless Security Secrets & Solutions, 2nd edition
Johnny Cache, Joshua Wright, Vincent Liu, 2010
Corporate Security in the Asia-Pacific Region: Crisis, Crime, Fraud, and Misconduct
Christopher J. CubbageCPP, David J. BrooksPhD, 2012
From the Files of a Security Expert Witness
Charles A. Sennewald CPP, 2013
Hospital and Healthcare Security, Sixth Edition
Tony W York Tony YorkCPPCHPAM. S.MBA, Don MacAlister, 2015
Integrated Security Systems Design: Concepts, Specifications, and Implementation (v. 1)
Thomas L. NormanCPPPSPCSC, 2007
Retail Security and Loss Prevention
Read Hayes PhD, CPP (auth.), 2007
Risk Analysis and Security Countermeasure Selection
Thomas L. NormanCPP PSP CSC, 2009
Risk Analysis and Security Countermeasure Selection, Second Edition
Norman, Thomas L. CPP/PSP/CSC, 2015
Risk Analysis and Security Countermeasure Selection, Second Edition
Norman, Thomas L. CPP/PSP/CSC, 2015
Security Consulting
Charles A. Sennewald CPP, 1989
Security Consulting, Fourth Edition
Charles A. Sennewald CPP, 2012
Absorptive Capacity in the Security and Justice Sectors. Assessing Obstacles to Success in the Donor-Recipient Relationship
Robert D. Lamb,Kathryn Mixon,Andrew Halterman, 2013
Security Careers. Skills, Compensation, and Career Paths
Stephen W. Walker and James E. Foushée (Auth.), 2014
Breaking into information security : crafting a custom career path to get the job you really want
Liu, Chris; More, Josh; Stieber, Anthony J, 2015
Cloud Computing: Implementation, Management, and Security
John Rittinghouse, James Ransome, 2009
Cloud Computing: Implementation, Management, and Security
John Rittinghouse, James Ransome, 2009
Cloud Computing: Implementation, Management, and Security
John Rittinghouse, James Ransome, 2009
Cloud Computing: Implementation, Management, and Security
John Rittinghouse, James Ransome, 2009
