نتایج جستجو
Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004. Proceedings
Taekyoung Kwon (auth.), Kan Zhang, Yuliang Zheng (eds.), 2004
Body Area Networks: Safety, Security, and Sustainability
Professor Sandeep K. S. Gupta, Dr Tridib Mukherjee, Dr Krishna Kumar Venkatasubramanian, 2013
Advances in Cryptology – ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings
Alex Biryukov, Dmitry Khovratovich (auth.), Mitsuru Matsui (eds.), 2009
A System-Aware Cyber Security architecture
Rick A Jones Affiliation: Systems and Information Engineering, University of Virginia, Charlottesville, VA 22904; Barry Horowitz Affiliation: Systems and Information Engineering, University of Virginia, Charlottesville, VA 22904, 2011
Access Contested. Security, Identity, and Resistance in Asian Cyberspace
Ronald Deibert,John Palfrey,Rafal Rohozinski, et al.MIT Press|MIT Press||Adult NonfictionComputer TechnologyLanguage(s): EnglishOn sale date: 05.06.2012Street date: 05.06.2012, 2012
Access Contested: Security, Identity, and Resistance in Asian Cyberspace
Ronald Deibert, John Palfrey, Rafal Rohozinski, Jonathan Zittrain, 2011
CISSP: Certified Information Systems Security Professional Study Guide
James M. Stewart, Ed Tittel, Mike Chapple, 2011
Critical Infrastructure System Security and Resiliency
Betty E Biringer, 2013
Double Trouble: Iran and North Korea as Challenges to International Security
Patrick M. Cronin, 2007
High-rise security and fire life safety
Geoff Craighead, 2003
High-Rise Security and Fire Life Safety
Craighead (Auth.), 2009
Loss control auditing : a guide for conducting fire, safety, and security audits
EScott Dunlap, 2011
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems: First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedings
Eve Atallah, Serge Chaumette (auth.), Damien Sauveron, Konstantinos Markantonakis, Angelos Bilas, Jean-Jacques Quisquater (eds.), 2007
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems: First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedings
Eve Atallah, Serge Chaumette (auth.), Damien Sauveron, Konstantinos Markantonakis, Angelos Bilas, Jean-Jacques Quisquater (eds.), 2007
Java on Smart Cards:Programming and Security
D. Bolignano, D. Le Métayer, C. Loiseaux (auth.), Isabelle Attali, Thomas Jensen (eds.), 2001
Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)
Stefan Mangard, Elisabeth Oswald, Thomas Popp, 2007
Risk Propagation Assessment for Network Security: Application to Airport Communication Network Design
Mohamed Slim Ben Mahmoud, Nicolas Larrieu, Aliain Pirovano, 2013
Monitoring, Security, and Rescue Techniques in Multi-Agent Systems: Proceedings of the International Workshop Msras 2004
Tetsuzo Tanino, Tamaki Tanaka, Masahiro Inuiguchi, 2003
Monitoring, Security, and Rescue Techniques in Multiagent Systems (Advances in Soft Computing)
Barbara Dunin-Keplicz, Andrzej Jankowski, Andrzej Skowron, Marcin Szczuka (Editors), 2005
Cyber-Physical Attacks: A Growing Invisible Threat
George Loukas PhD in Network SecurityImperial CollegeUK; MEng in Electrical Engineering and Computer ScienceNTUAGreece, 2015
