نتایج جستجو

Integrating security and software engineering: advances and future visions
Haralambos Mouratidis, Haralambos Mouratidis, 2007
Help or Harm: The Human Security Effects of International NGOs
Amanda Murdie, 2014
Introduction to Security, Eighth Edition
Robert Fischer Ph.D.
Security in Wireless LANs and MANs
Thomas Hardjono, 2005
Enemies of Intelligence: Knowledge and Power in American National Security
Richard K. Betts, 2007
Enemies of Intelligence: Knowledge and Power in American National Security
Richard K. Betts, 2007
Error Correcting Coding and Security for Data Networks: Analysis of the Superchannel Concept
Grigorii Kabatiansky, 2005
Error Correcting Coding and Security for Data Networks: Analysis of the Superchannel Concept
Grigorii Kabatiansky, 2005
Error Correcting Coding and Security for Data Networks: Analysis of the Superchannel Concept
Grigorii Kabatiansky, 2005
Strategic US Foreign Assistance : The Battle Between Human Rights and National Security
Rhonda L. Callaway, 2008
Security for mobile networks and platforms
Selim Aissi, 2006
The Quest: Energy, Security, and the Remaking of the Modern World
Daniel Yergin, 2011
Rising Star: China's New Security Diplomacy
Bates Gill, 2007
Guarding Your Business: A Management Approach to Security
Sumit Ghosh, 2004
Social Security as a Human Right: Drafting a General Comment on Article 9 ICESCR - Some Challenges
Emmanuel Reynaud (auth.), 2007
Social Security as a Human Right: The Protection afforded by the ECHR
Ana Gomez Heredero, 2007
Social Security in Britain
Stephen McKay, 1999
Social Security Law
Robert East (auth.), 1999