نتایج جستجو
Israel's National Security: Issues and Challenges Since the Yom Kippur War
Efraim Inbar, 2008
Regional Security Regimes: Israel and Its Neighbors
Efraim Inbar, 1995
Applications of Data Mining in Computer Security
Steven Noel, 2002
Data and Applications Security and Privacy XXVII: 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings
Sabrina De Capitani di Vimercati, 2013
Damodaran on Valuation: Security Analysis for Investment and Corporate Finance
Aswath Damodaran, 1994
Damodaran on valuation: security analysis for investment and corporate finance
Aswath Damodaran, 1994
Damodaran on Valuation: Security Analysis for Investment and Corporate Finance
Aswath Damodaran, 2006
Information Technology Convergence: Security, Robotics, Automations and Communication
Shih-Chang Huang, 2013
Information Technology Convergence: Security, Robotics, Automations and Communication
Shih-Chang Huang, 2013
Vision and Displays for Military and Security Applications: The Advanced Deployable Day/Night Simulation Project
Mary K. Kaiser (auth.), 2010
A Challenge to Social Security. The Changing Roles of Women and Men in American Society
Richard V. Burkhauser, 1982
Advances in Human-Computer Interaction: Human Comfort and Security
K. C. Varghese (auth.), 1995
