- کتب و مجلات «608 عنوان»
- همه (885)
- مقاطع تحصیلی (1)
- کتب و مجلات (608)
- نرم افزار (266)
- فیلمهای آموزشی (11)
امنیت و سیستم های جاسازی شده: دوره 2 امنیت ناتو از طریق ...
Security and Embedded Systems: Volume 2 NATO Security t ......
ارتباطات کوانتومی و امنیت (ناتو برای صلح و امنیت سری: ا ...
Quantum Communication and Security (NATO Science for Pe ......
در حال ظهور تهدیدات علیه امنیت انرژی و پایداری: مجموعه ...
Emerging Threats to Energy Security and Stability: Proc ......
روش های مهندسی و ابزار برای نرم افزار ایمنی و امنیت - د ...
Engineering Methods and Tools for Software Safety and S ......
استخراج داده های عظیم در امنیت : پیشرفت در داده کاوی ، ...
Mining Massive Data Sets for Security: Advances in Data ......
تهدید نامرئی: مالی و اطلاعات جرایم فناوری و امنیت ملی، ...
Invisible Threats: Financial and Information Technology ......
پیشرفت ها و چالش ها در Multisensor داده ها و پردازش اطل ...
Advances and Challenges in Multisensor Data and Informa ......
امنیت زیست محیطی و ایمنی عمومی (علوم ناتو برای صلح و ام ...
Environmental Security and Public Safety (NATO Science ......
انرژی و چالش های زیست محیطی به امنیت ( ناتو برای صلح و ...
Energy and Environmental Challenges to Security (NATO S ......
گزینه های انرژی تاثیر بر امنیت منطقه ( ناتو برای صلح و ...
Energy Options Impact on Regional Security (NATO Scienc ......
فرهنگ امنیت اطلاعات تعریف شرایط که تعریف امنیت برای تجا ...
The Information Security Dictionary Defining The Terms ......
فرهنگ لغت امنیت اطلاعات : تعریف اصطلاحاتی که برای تجارت ...
The information security dictionary : defining the term ......
ایمنی و مهندسی VI امنیت. ششمین کنفرانس بین المللی ایمنی ...
Safety and Security Engineering VI. Sixth International ......
شاخص مختصری از امنیت انرژی خانگی: رابطه آن با امنیت غذا ...
A Brief Indicator of Household Energy Security: Associa ......
Doubling of serum creatinine: i ...
Background The evaluation of the progression of renal insufficiency, or decline in glomerular filtration rate (GFR), has been approached more simply ...
ارتباطات کوانتومی و امنیت (ناتو ب ...
Quantum Communication and Secur ...
This volume aims to assess the state-of-the-art in the field of Quantum Communication and Security and to identify new research challenges. The papers ...
در حال ظهور تهدیدات علیه امنیت ان ...
Emerging Threats to Energy Secu ...
With the global economy set to be largely dependent on oil and gas for the next twenty to thirty years, and global terrorism more prevalent and more f ...
روش های مهندسی و ابزار برای نرم ا ...
Engineering Methods and Tools f ...
As a consequence of the wide distribution of software and software infrastructure, information security and safety depend on the quality and excellent ...
استخراج داده های عظیم در امنیت : ...
Mining Massive Data Sets for Se ...
The real power for security applications will come from the synergy of academic and commercial research focusing on the specific issue of security. Sp ...
تهدید نامرئی: مالی و اطلاعات جرای ...
Invisible Threats: Financial an ...
Technology and the information revolution have changed the balance of power, both domestically and internationally, and are altering the dynamics of i ...
پیشرفت ها و چالش ها در Multisenso ...
Advances and Challenges in Mult ...
Information fusion resulting from multi-source processing, often called multisensor data fusion when sensors are the main sources of information, is a ...
امنیت زیست محیطی و ایمنی عمومی (ع ...
Environmental Security and Publ ...
Although the end of the Cold War has paved the way to a substantial demilitarisation and conversion, the leftovers of this process such as former mili ...
انرژی و چالش های زیست محیطی به ام ...
Energy and Environmental Challe ...
The thirst for energy and the need to manage environmental impacts arising from the carbon economy are urgent issues facing this and future generation ...
گزینه های انرژی تاثیر بر امنیت من ...
Energy Options Impact on Region ...
This book addresses energy-related issues in light of the options available to the European and Mediterranean countries. The articles attempt to ident ...
Microsoft System Center 2012 En ...
Microsoft System Center 2012 Endpoint Protection (previously known as Forefront Endpoint Protection 2012) protects client and server operating systems ...
Quantification of recurrence vo ...
Introduction New coils with unproven clinical benefit enlarge the armamentarium for endovascular aneurysm treatment continuously. Large patient numb ...
شاخص مختصری از امنیت انرژی خانگی: ...
A Brief Indicator of Household ...
رشته های مرتبط: علوم اقتصادی، پزشکی، علوم تغذیه، اقتصاد نفت و گاز و اقتصاد مالی بحث مفهوم HES اگرچه به طور ضمنی در گذشت به رسمیت شناخته شده اما به طور ...
امنیت مردم محور
People-Centric Security: Transf ...
“امنیت مردم محور” با اتخاذ برنامهای که بر پایه امنیت انسانی قرار دارد موجب بهحداقلرساندن خطر، محافظت از دارایی شرکتها و اجتناب از حوادث فاجعهبار ...
Digital Security: Cyber Terror ...
Since the advent of widespread Internet use, digital technology has been used for criminal intent. From computer viruses capable of shutting down and ...
Security Risk Management : Buil ...
Introduction to Risk Management -- Risk Assessment and Analysis Techniques -- Building and Running a Risk Management Program.
Security+ guide to network secu ...
1. Introduction to Security. SYSTEMS SECURITY. 2. System Threats and Risks. 3. Protecting Systems. NETWORK SECURITY. 4. Network Vulnerabilities and At ...
Physical and logical security c ...
1. Introduction -- 2. Physical Security History -- 3. What is Convergence and Why Do We Care? -- 4. Examples from the Media, Interesting Stories -- ...
تجزیه و تحلیل خودکار امنیتی از ان ...
Automated Security Analysis of ...
Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. Thes ...