نتایج جستجو

Security Design Patterns
Bob Blakley, Craig Heath, Open Group Security Forum, 2004
People-centric security : transforming your enterprise security culture
Hayden, Lance, 2016
North Korea and Regional Security in the Kim Jong-un Era: A New International Security Dilemma
Bruce E. Bechtol Jr. (auth.), 2014
Security Intelligence A Practitioners Guide to Solving Enterprise Security Challenges
Qing Li, Gregory Clark, 2015
Thor's Microsoft security bible : a collection of practical security techniques
Timothy ''Thor'' Mullen, 2011
Information Security — the Next Decade: Proceedings of the IFIP TC11 eleventh international conference on information security, IFIP/Sec ’95
Jan H. P. Eloff, Sebastiaan H. von Solms (eds.), 1995
Security, Democracy and War Crimes: Security Sector Transformation in Serbia
James Gow, Ivan Zverzžhanovski (auth.), 2013
Agile Application Security: Enabling Security in a Continuous Delivery Pipeline
Laura Bell, Michael Brunton-Spall, Rich Smith, Jim Bird, 2017
International Conference on Applications and Techniques in Cyber Security and Intelligence: Applications and Techniques in Cyber Security and Intelligence
Jemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam (eds.), 2018
SDN and NFV Security: Security Analysis of Software-Defined Networking and Network Function Virtualization
Rahamatullah Khondoker (eds.), 2018
The CIS Critical Security Controls for Effective Cyber Defense, Version 6.0
Center for Internet Security, 2015
Security analysis. Part VII, Additional aspects of security analysis ; Discrepancies between price and value
Graham, Benjamin; Buffett, Warren; Klarman, Seth A.; Dodd, David Le Fevre, 2009
Security Analysis, Part VII - Additional Aspects of Security Analysis. Discrepancies Between Price and Value
Benjamin Graham; David L. Dodd, 2009