نتایج جستجو

Bitcoin and Blockchain Security
Ghassan Karame, Elli Androulaki, 2017
MI5, MI6 - Britain__039;s Security and Intelligence Services
R. G. Grant, 1989
Food Security and Climate Change
Shyam Singh Yadav, Robert J. Redden, Jerry L. Hatfield , Andreas W. Ebert, Danny Hunter, 2019
Global Supply Chain Security and Management. Appraising Programs, Preventing Crimes
Darren Prokop (Auth.), 2017
Security Operations Center Guidebook. A Practical Guide for a Successful SOC
Gregory Jarpey and R. Scott McCoy (Auth.), 2017
The Long Détente: Changing Concepts of Security and Cooperation in Europe, 1950s-1980s
Oliver Bange; Poul Villaume, 2017
Globalization, Difference, and Human Security
Mustapha Kamal Pasha (ed.), 2013
Principles of Computer Security
William Arthur Conklin; Greg White; Dwayne Williams; Roger Davis; Chuck Cothren, 2015
Human Rights and State Security: Indonesia and the Philippines
Anja Jetschke, 2010
Cryptographic and Information Security Approaches for Images and Videos
S. Ramakrishnan, 2018
Cryptographic and Information Security Approaches for Images and Videos
S. Ramakrishnan, 2019
Obstruction of Justice: How the Deep State Risked National Security to Protect the Democrats
Luke Rosiak, 29 Jan 2019
Kali Linux Wireless Pentesting and Security for Beginners
Hardeep Singh, 2017
The Ultimate Weapon is No Weapon: Human Security and the New Rules of War and Peace
Shannon D. Beebe, Mary H. Kaldor, 2010
The Ultimate Weapon Is No Weapon: Human Security and the New Rules of War and Peace
Shannon D. Beebe, Mary H. Kaldor, 2010
The Psychology of Information Security
Leron Zinatullin [Leron Zinatullin], 2016