قرن 21 امنیت و CPTED: طراحی برای حفاظت از زیرساخت های ح ...
21st Century Security and CPTED: Designing for Critical ......
سوخت های زیستی زمین گرفتن و امنیت غذایی در آفریقا
Biofuels, Land Grabbing and Food Security in Africa
ابراهیم اپستین: پدر فراموش شده از تامین اجتماعی
Abraham Epstein: The Forgotten Father of Social Securit ...
حاکمیت شرکتی و امنیت منابع در چین : دگرگونی منابع جهانی ...
Corporate Governance and Resource Security in China: Th ......
19 گناه مرگبار از نرم افزار امنیتی :: برنامه نویسی معای ...
19 Deadly Sins of Software Security: Programming Flaws ......
24 گناه کبیره از نرم افزار امنیتی: نقص های برنامه نویسی ...
24 Deadly Sins of Software Security: Programming Flaws ......
24 گناه مرگبار از نرم افزار امنیتی :: برنامه نویسی معای ...
24 Deadly Sins of Software Security: Programming Flaws ......
پیشرفت در امنیت و روش های پرداخت برای موبایل بازرگانی
Advances in Security and Payment Methods for Mobile Com ...
جهان نا امنی: دیدگاه انسان شناسی امنیت
A World of Insecurity: Anthropological Perspectives of ...
نمایندگی تجارت الکترونیک: راه حل های بازار، مسائل امنیت ...
E-Commerce Agents: Marketplace Solutions, Security Issu ......
تصویربرداری 3D برای ایمنی و امنیت (تصویربرداری محاسباتی ...
3D Imaging for Safety and Security (Computational Imagi ......
موضوع امنیت کاربرد نظریه دلبستگی به روانپزشکی و روان در ...
A Matter of Security The Application of Attachment Theo ......
امنیت اطلاعات و تضمین: کنفرانس بین المللی عیسی 2011، بر ...
Information Security and Assurance: International Confe ......
شبکه نرم افزار : مجازی سازی ، SDN ، 5G ، امنیت
Software Networks: Virtualization, SDN, 5G, Security
شبکه نرم افزار : مجازی سازی ، SDN ، 5G ، امنیت
Software Networks: Virtualization, SDN, 5G, Security
امنیت شبکه: کانون دانش ( مورگان کافمن سری در شبکه )
Network Security: A Practical Approach (The Morgan Kauf ...
راهنمای عملی برای تضمین امنیت اطلاعات و مهندسی
A practical guide to security engineering and informati ...
کشف را 20 چیزهایی شما نمی دانستند که در مورد همه چیز: م ...
Discover's 20 Things You Didn't Know About Everything: ......
کشف را 20 چیزهایی شما نمی دانستند که در مورد همه چیز: م ...
Discover's 20 Things You Didn't Know About Everything: ......
سیستم های کنترل دسترسی: امنیت، مد ...
Access Control Systems: Securit ...
Not much to say on this book except that I found it incomplete and lacking in practical processes, more studious than application oriented. I have rea ...
قرن 21 امنیت و CPTED: طراحی برای ...
21st Century Security and CPTED ...
Once overlooked as a minor and ineffective tactic in the mitigation and prevention of terrorism and violent crime, Crime Prevention Through Environmen ...
سوخت های زیستی زمین گرفتن و امنیت ...
Biofuels, Land Grabbing and Foo ...
Energy crises and climate change have generated global demands for alternative non-fossil fuel sources. This has led to a rapid increase of investment ...
ابراهیم اپستین: پدر فراموش شده از ...
Abraham Epstein: The Forgotten ...
Social Security has long been called the third rail of American politics—an unassailable institution for which we can thank Franklin Delano Roosevelt ...
حاکمیت شرکتی و امنیت منابع در چین ...
Corporate Governance and Resour ...
Corporate governance has become a household term and investors across the world are demanding more transparency and accountability from controllers of ...
AAA هویت مدیریت امنیت
AAA Identity Management Securit ...
Cisco's complete, authoritative guide to Authentication, Authorization, and Accounting (AAA) solutions with CiscoSecure ACS AAA solutions are very f ...
19 گناه مرگبار از نرم افزار امنیت ...
19 Deadly Sins of Software Secu ...
Use this hands-on-guide to secure your software by eliminating code vulnerabilities from the start. This book is essential for all software developers ...
24 گناه کبیره از نرم افزار امنیتی ...
24 Deadly Sins of Software Secu ...
"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers ...
24 گناه مرگبار از نرم افزار امنیت ...
24 Deadly Sins of Software Secu ...
"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers ...
پیشرفت در امنیت و روش های پرداخت ...
Advances in Security and Paymen ...
Recently, the emergence of wireless and mobile networks has made possible the admission of electronic commerce to a new application and research subje ...
جهان نا امنی: دیدگاه انسان شناسی ...
A World of Insecurity: Anthropo ...
Human security is a key element in the measure of well-being and is a hot topic in anthropology and development studies. A World of Insecurity outline ...
نمایندگی تجارت الکترونیک: راه حل ...
E-Commerce Agents: Marketplace ...
Among the many changes brought by the Internet is the emergence of electronic commerce over the Web. E-commerce activities, such as the online exchang ...
دفاع دیجیتال: تایید امنیت اطلاعات
DIGITAL DEFENSE: VERIFICATION O ...
Abstract: The basic objective of digital defense is to verify the security intelligence of a distributed computing system (DCS) so that the informatio ...
تصویربرداری 3D برای ایمنی و امنیت ...
3D Imaging for Safety and Secur ...
This book presents the thoroughly revised versions of lectures given by leading researchers during the Workshop on Advanced 3D Imaging for Safety and ...
موضوع امنیت کاربرد نظریه دلبستگی ...
A Matter of Security The Applic ...
A contemporary case-based discussion of ethical dilemmas faced by researchers in forensic mental health, this book offers useful guidance to anyone pl ...
امنیت اطلاعات و تضمین: کنفرانس بی ...
Information Security and Assura ...
This book constitutes the proceedings of the International Conference on Information Security and Assurance, held in Brno, Czech Republic in August 20 ...
شبکه نرم افزار : مجازی سازی ، SDN ...
Software Networks: Virtualizati ...
The goal of this book is to describe new concepts for Internet next generation. This architecture is based on virtual networking using Cloud and datac ...
شبکه نرم افزار : مجازی سازی ، SDN ...
Software Networks: Virtualizati ...
The goal of this book is to describe new concepts for Internet next generation. This architecture is based on virtual networking using Cloud and datac ...
امنیت شبکه: کانون دانش ( مورگان ک ...
Network Security: A Practical A ...
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioner ...
راهنمای عملی برای تضمین امنیت اطل ...
A practical guide to security e ...
• Examines the impact of both accidental and malicious, intentional action and inaction• Defines the five major components of a comprehensive and effe ...
کشف را 20 چیزهایی شما نمی دانستند ...
Discover's 20 Things You D ...
How much do you know about . . . Obesity Sleep Meteors Aliens Bees Sperm banks Sex in space Duct tape Germs Airport security Death Ancient weapons Rat ...
کشف را 20 چیزهایی شما نمی دانستند ...
Discover's 20 Things You D ...
How much do you know about . . . Obesity Sleep Meteors Aliens Bees Sperm banks Sex in space Duct tape Germs Airport security Death Ancient weapons Rat ...
امنیت شبکه های بی سیم Multihop
Security for Multihop Wireless ...
Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a dif ...
امنیت سایبر: تجزیه و تحلیل ترافیک ...
Cyber Security: Analytics, Tech ...
Contains a unique codification of cyber securityExcellent book for students, postgraduates and professionalsGives a profound overview of the most spok ...
فاجعه ارتباطات در جهان رسانه ها ح ...
Disaster Communications in a Ch ...
Communications is key to the success of disaster mitigation, preparedness, response and recovery. Accurate information disseminated to the general pub ...