- کتب و مجلات «608 عنوان»
- همه (885)
- مقاطع تحصیلی (1)
- کتب و مجلات (608)
- نرم افزار (266)
- فیلمهای آموزشی (11)
ارتباطات کوانتومی و امنیت (ناتو برای صلح و امنیت سری: ا ...
Quantum Communication and Security (NATO Science for Pe ......
امنیت و سیستم های جاسازی شده: دوره 2 امنیت ناتو از طریق ...
Security and Embedded Systems: Volume 2 NATO Security t ......
در حال ظهور تهدیدات علیه امنیت انرژی و پایداری: مجموعه ...
Emerging Threats to Energy Security and Stability: Proc ......
روش های مهندسی و ابزار برای نرم افزار ایمنی و امنیت - د ...
Engineering Methods and Tools for Software Safety and S ......
تهدید نامرئی: مالی و اطلاعات جرایم فناوری و امنیت ملی، ...
Invisible Threats: Financial and Information Technology ......
استخراج داده های عظیم در امنیت : پیشرفت در داده کاوی ، ...
Mining Massive Data Sets for Security: Advances in Data ......
پیشرفت ها و چالش ها در Multisensor داده ها و پردازش اطل ...
Advances and Challenges in Multisensor Data and Informa ......
گزینه های انرژی تاثیر بر امنیت منطقه ( ناتو برای صلح و ...
Energy Options Impact on Regional Security (NATO Scienc ......
انرژی و چالش های زیست محیطی به امنیت ( ناتو برای صلح و ...
Energy and Environmental Challenges to Security (NATO S ......
امنیت زیست محیطی و ایمنی عمومی (علوم ناتو برای صلح و ام ...
Environmental Security and Public Safety (NATO Science ......
BS ISO/IEC 27035:2011 اطلاعات فن آوری. تکنیک های امنیتی ...
BS ISO/IEC 27035:2011 Information technology. Security ......
استاندارد ISO / IEC 27003: 2010، فناوری اطلاعات - فنون ...
ISO/IEC 27003:2010, Information technology - Security t ......
راهنمای سیستم ایمنی و امنیت. سایبر و مدیریت ریسک، امنیت ...
Handbook of System Safety and Security. Cyber Risk and ......
ایمنی و مهندسی VI امنیت. ششمین کنفرانس بین المللی ایمنی ...
Safety and Security Engineering VI. Sixth International ......
امنیت انرژی در آسیا (ادبیات پارسی امنیتی در آسیا اقیانو ...
Energy Security in Asia (Routledge Security in Asia Pac ......
تجزیه و تحلیل خطر، ایمنی سد، امنیت سد، و مدیریت زیرساخت ...
Risk analysis, dam safety, dam security, and critical i ......
تجزیه و تحلیل خودکار امنیتی از اندیشه و من: برنامه های ...
Automated Security Analysis of Android and i: OS Applic ......
فرهنگ لغت امنیت اطلاعات : تعریف اصطلاحاتی که برای تجارت ...
The information security dictionary : defining the term ......
فرهنگ امنیت اطلاعات تعریف شرایط که تعریف امنیت برای تجا ...
The Information Security Dictionary Defining The Terms ......
Doubling of serum creatinine: i ...
Background The evaluation of the progression of renal insufficiency, or decline in glomerular filtration rate (GFR), has been approached more simply ...
ارتباطات کوانتومی و امنیت (ناتو ب ...
Quantum Communication and Secur ...
This volume aims to assess the state-of-the-art in the field of Quantum Communication and Security and to identify new research challenges. The papers ...
در حال ظهور تهدیدات علیه امنیت ان ...
Emerging Threats to Energy Secu ...
With the global economy set to be largely dependent on oil and gas for the next twenty to thirty years, and global terrorism more prevalent and more f ...
روش های مهندسی و ابزار برای نرم ا ...
Engineering Methods and Tools f ...
As a consequence of the wide distribution of software and software infrastructure, information security and safety depend on the quality and excellent ...
تهدید نامرئی: مالی و اطلاعات جرای ...
Invisible Threats: Financial an ...
Technology and the information revolution have changed the balance of power, both domestically and internationally, and are altering the dynamics of i ...
استخراج داده های عظیم در امنیت : ...
Mining Massive Data Sets for Se ...
The real power for security applications will come from the synergy of academic and commercial research focusing on the specific issue of security. Sp ...
پیشرفت ها و چالش ها در Multisenso ...
Advances and Challenges in Mult ...
Information fusion resulting from multi-source processing, often called multisensor data fusion when sensors are the main sources of information, is a ...
گزینه های انرژی تاثیر بر امنیت من ...
Energy Options Impact on Region ...
This book addresses energy-related issues in light of the options available to the European and Mediterranean countries. The articles attempt to ident ...
انرژی و چالش های زیست محیطی به ام ...
Energy and Environmental Challe ...
The thirst for energy and the need to manage environmental impacts arising from the carbon economy are urgent issues facing this and future generation ...
امنیت زیست محیطی و ایمنی عمومی (ع ...
Environmental Security and Publ ...
Although the end of the Cold War has paved the way to a substantial demilitarisation and conversion, the leftovers of this process such as former mili ...
Quantification of recurrence vo ...
Introduction New coils with unproven clinical benefit enlarge the armamentarium for endovascular aneurysm treatment continuously. Large patient numb ...
Microsoft System Center 2012 En ...
Microsoft System Center 2012 Endpoint Protection (previously known as Forefront Endpoint Protection 2012) protects client and server operating systems ...
BS ISO/IEC 27035:2011 اطلاعات فن ...
BS ISO/IEC 27035:2011 Informati ...
Descriptors: Data processing, Computers, Management, Data security, Data storage protection, Anti-burglar measures, Computer networks, Computer softwa ...
استاندارد ISO / IEC 27003: 2010، ...
ISO/IEC 27003:2010, Information ...
ISO/IEC 27003:2010 focuses on the critical aspects needed for successful design and implementation of an Information Security Management System (ISMS) ...
راهنمای سیستم ایمنی و امنیت. سایب ...
Handbook of System Safety and S ...
Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Funct ...
امنیت مردم محور
People-Centric Security: Transf ...
“امنیت مردم محور” با اتخاذ برنامهای که بر پایه امنیت انسانی قرار دارد موجب بهحداقلرساندن خطر، محافظت از دارایی شرکتها و اجتناب از حوادث فاجعهبار ...
تجزیه و تحلیل خودکار امنیتی از ان ...
Automated Security Analysis of ...
Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. Thes ...
کامپیوتر حادثه پاسخ و امنیت محصول ...
Computer Incident Response and ...
Computer Incident Response and Product Security The practical guide to building and running incident response and product security teams Damir Raj ...
هوا، آب و مدلسازی کیفیت خاک برای ...
Air, Water and Soil Quality Mod ...
This book contains the proceedings of the NATO Advanced Research Workshop on Air, Water and Soil Quality Modelling for Risk and Impact Assessment. The ...