نتایج جستجو
Security in RFID and Sensor Networks
Yan Zhang, 2009
Middle East Security Issues: In the Shadow of Weapons
Barry R. Schneider, 2002
Middle East Security Issues: In the Shadow of Weapons of Mass Destruction Proliferation
Barry R. Schneider, 1999
Migration, Security, and Citizenship in the Middle East: New Perspectives
Peter Seeberg, 2013
Migration, Security, and Citizenship in the Middle East: New Perspectives
Peter Seeberg, 2013
Redefining Security in the Middle East
Tami Amanda Jacoby, 2002
Guidelines for chemical transportation safety, security, and risk management
American Institute of Chemical Engineers. Center for Chemical Process Safety
Multi-Plant Safety and Security Management in the Chemical and Process Industries
Genserik L.L. Reniers, 2010
Multi-Plant Safety and Security Management in the Chemical and Process Industries
Genserik L. L. Reniers, 2010
Enterprise Web services security
Rickland Hollar, 2006
Maximizing the Security and Development Benefits from the Biological and Toxin Weapons Convention
Graham S. Pearson (auth.), 2002
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach
Charles P. Pfleeger, 2011
Distributed Networks: Intelligence, Security, and Applications
Qurban A Memon, 2013
Iran, Israel, and the United States: Regime Security Vs. Political Legitimacy
Jalil Roshandel, 2011
Java 2 Network Security
Marco Pistoia, 1999
Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns
Clive Blackwell, 2014
Computer Security: Principles and Practice
William Stallings, 2011
