نتایج جستجو
Wireshark Network Security
Piyush Verma, 2015
OR, Defence and Security
Roger Forder, 2014
OR, Defence and Security
Roger A Forder (eds.), 2015
A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security
Will Arthur, David Challener, Kenneth Goldman (auth.), 2015
Transactions on data hiding and multimedia security VII
Peter Meerwald, Andreas Uhl (auth.), Yun Q. Shi (eds.), 2012
Environment and Hope: Improving Health, Reducing AIDS and Promoting Food Security in the World
I. Leslie Rubin, I. Leslie Rubin, Joav Merrick, 2014
Energy Market Experience Learning from the Blackouts: Transmission System Security in Competitive Electricity Markets
International Energy Agency, 2005
Algorithms, architectures and information systems security
Aditya Bagchi, Bhargab B. Bhattacharya, Susmita Sur-kolay, Subhas C. Nandy, 2009
Security in Wireless Mesh Networks
Yan Zhang, Jun Zheng, Honglin Hu, 2008
Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Yan Zhang, Jun Zheng, Honglin Hu, 2008
Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Yan Zhang, Jun Zheng, Honglin Hu, 2008
Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Yan Zhang, Jun Zheng, Honglin Hu, 2008
Information Security Practice and Experience: 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings
Xinyi Huang, Jianying Zhou (eds.), 2014
Information Security Practice and Experience: 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings
Javier Lopez, Yongdong Wu (eds.), 2015
Information Security Practice and Experience: 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings
A. Salaiwarakul, M. D. Ryan (auth.), Liqun Chen, Yi Mu, Willy Susilo (eds.), 2008
Information Security Practice and Experience: 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings
A. Salaiwarakul, M. D. Ryan (auth.), Liqun Chen, Yi Mu, Willy Susilo (eds.), 2008
Information Security Practice and Experience: 5th International Conference, ISPEC 2009 Xi’an, China, April 13-15, 2009 Proceedings
Luan Ibraimi, Qiang Tang, Pieter Hartel, Willem Jonker (auth.), Feng Bao, Hui Li, Guilin Wang (eds.), 2009
Information Security Practice and Experience: 5th International Conference, ISPEC 2009 Xi’an, China, April 13-15, 2009 Proceedings
Luan Ibraimi, Qiang Tang, Pieter Hartel, Willem Jonker (auth.), Feng Bao, Hui Li, Guilin Wang (eds.), 2009
Information Security Practice and Experience: 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings
Huafei Zhu (auth.), Feng Bao, Jian Weng (eds.), 2011
Information Security Practice and Experience: 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings
Huafei Zhu (auth.), Feng Bao, Jian Weng (eds.), 2011
Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings
Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan (auth.), Mark D. Ryan, Ben Smyth, Guilin Wang (eds.), 2012
Information Security Practice and Experience: 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings
Yuxin Meng, Lam-For Kwok (auth.), Robert H. Deng, Tao Feng (eds.), 2013
