نتایج جستجو
Applied Security Visualization
Raffael Marty, 2008
Reporting Dangerously: Journalist Killings, Intimidation and Security
Simon Cottle, 2016
Fundamentals of Computer Security
Josef Pieprzyk, 2003
Fundamentals of Computer Security
Josef Pieprzyk, 2003
Fundamentals of Computer Security
Prof. Dr. Josef Pieprzyk, 2003
Information Security and Privacy: Second Australasian Conference, ACISP'97 Sydney, NSW, Australia, July 7–9, 1997 Proceedings
Professor Fred Piper (auth.), 1997
Information Security and Privacy: Second Australasian Conference, ACISP'97 Sydney, NSW, Australia, July 7–9, 1997 Proceedings
Professor Fred Piper (auth.), 1997
Provable Security: Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings
Alexander W. Dent (auth.), 2009
Water Security: Principles, Perspectives and Practices
Bruce Lankford, 2013
Port Engineering: Planning, Construction, Maintenance, and Security
Gregory P. Tsinker, 2004
Foundations of Mac OS X Leopard Security
Zack Smith, 2008
Foundations of Mac OS X Leopard Security
Barker, William, 2008
Learning iOS Security
Allister Banks, 2015
A Global Security Triangle: European, African and Asian interaction
Valeria Bello, 2009
Africa Today: Culture, Economics, Religion, Security
Heather Deegan, 2009
