پیشرفت در انجمن رمز ایران – ASIACRYPT 2009: پانزدهمین ک ...
Advances in Cryptology – ASIACRYPT 2009: 15th Internati ......
پیشرفت در انجمن رمز ایران – ASIACRYPT 2007: سیزدهمین کن ...
Advances in Cryptology – ASIACRYPT 2007: 13th Internati ......
پیشرفت در انجمن رمز ایران – ASIACRYPT 2006: 12 کنفرانس ...
Advances in Cryptology – ASIACRYPT 2006: 12th Internati ......
پیشرفت در انجمن رمز ایران - ASIACRYPT 2008: 14 کنفرانس ...
Advances in Cryptology - ASIACRYPT 2008: 14th Internati ......
پیشرفت در انجمن رمز ایران - ASIACRYPT 2003: نهمین کنفرا ...
Advances in Cryptology - ASIACRYPT 2003: 9th Internatio ......
لایه مرزی جوی: طبیعت، تئوری و برنامه به مدل سازی محیط ز ...
Atmospheric Boundary Layers: Nature, Theory, and Applic ......
لایه های جوی مرز : طبیعت و کاربردهای آن به محیط زیست و ...
Atmospheric Boundary Layers: Nature, Theory and Applica ......
عصر اطلاعات گلچین : مفاهیم امنیت ملی عصر اطلاعات (جلد د ...
Information Age Anthology: National Security Implicatio ......
امنیت عمومی در دولت مذاکره : پلیس در امریکا لاتین و فرا ...
Public Security in the Negotiated State: Policing in La ......
آشنایی کلاسیک رمزنگاری: برنامه های کاربردی برای امنیت ا ...
A Classical Introduction to Cryptography: Applications ......
آشنایی کلاسیک رمزنگاری - برنامه های کاربردی برای امنیت ...
A Classical Introduction to Cryptography - Applications ......
نیروگاه هسته ای ابزار دقیق و کنترل سیستم های ایمنی و ام ...
Nuclear Power Plant Instrumentation and Control Systems ......
فناوری نانو نظامی: تکنولوژی جدید و کنترل تسلیحات ( مطال ...
Military Nanotechnology: New Technology and arms Contro ......
تغییر اقلیم و امنیت غذایی: تطبیق کشاورزی به جهان گرمتر
Climate Change and Food Security: Adapting Agriculture ...
تغییر اقلیم و امنیت غذایی: تطبیق کشاورزی به جهان گرمتر
Climate Change and Food Security: Adapting Agriculture ...
تحقیقات جرایم اینترنتی: پل زدن شکاف بین متخصصان امنیتی ...
Cyber Crime Investigations: Bridging the Gaps Between S ......
تحقیقات جرایم اینترنتی: پل زدن شکاف بین متخصصان امنیتی ...
Cyber Crime Investigations: Bridging the Gaps Between S ......
لایه مرزی جوی: طبیعت، تئوری و برن ...
Atmospheric Boundary Layers: Na ...
This volume presents peer-reviewed papers from the NATO Advanced Research Workshop on Atmospheric Boundary Layers held in April 2006. The papers are d ...
لایه های جوی مرز : طبیعت و کاربرد ...
Atmospheric Boundary Layers: Na ...
This collection of peer reviewed papers represents a concise, up-to-date summary of our current knowledge of planetary boundary layer (PBL) physics an ...
عصر اطلاعات گلچین : مفاهیم امنیت ...
Information Age Anthology: Nati ...
This is a continuation in the series of publications produced for the Center for Advanced Concepts and Technology (ACT), which was created as a "skunk ...
معاصر امنیت و استراتژی
Contemporary Security and Strat ...
Conflicting Identities and Multiple Masculinities takes as its focus the construction of masculinity in Western Europe from the early Middle Ages unti ...
طراحی امنیت معماری راه حل
Designing Security Architecture ...
There is an invisible elephant in this book: your application. And, it sits at the center of every topic we touch in each chapter we present. This boo ...
آشنایی کلاسیک رمزنگاری: برنامه ها ...
A Classical Introduction to Cry ...
A Classical Introduction to Cryptography: ApplicationsВ for Communications Security introduces fundamentals of information and communication security ...
آشنایی کلاسیک رمزنگاری - برنامه ه ...
A Classical Introduction to Cry ...
A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security b ...
نیروگاه هسته ای ابزار دقیق و کنتر ...
Nuclear Power Plant Instrumenta ...
Accidents and natural disasters involving nuclear power plants such as Chernobyl, Three Mile Island, and the recent meltdown at Fukushima are rare, bu ...
فناوری نانو نظامی: تکنولوژی جدید ...
Military Nanotechnology: New Te ...
With revolutionary changes in nanotechnology (NT) now on the horizon, many countries have started major research and development (R&D) programmes, whi ...
تغییر اقلیم و امنیت غذایی: تطبیق ...
Climate Change and Food Securit ...
Roughly a billion people around the world continue to live in state of chronic hunger and food insecurity. Unfortunately, efforts to improve their liv ...
تحقیقات جرایم اینترنتی: پل زدن شک ...
Cyber Crime Investigations: Bri ...
Written by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking.The book be ...
کتاب آشپزی امنیت لینوکس
Linux Security Cookbook
Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ...
کتاب آشپزی امنیت لینوکس
Linux Security Cookbook
I picked this book up since it had a chapter on iptables however after reading more I found that this book is quite dated. Someone who is still runnin ...
کتاب آشپزی امنیت لینوکس
Linux Security Cookbook
The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting ac ...
هواشناسی و امنیت انرژی : شبیه ساز ...
Meteorology and energy security ...
"Meteorological data is essential for both day-to-day energy management and for planning for the world's future energy security. The editor of this co ...
جریان Bioelectromagnetics مفاهیم: ...
Bioelectromagnetics Current Con ...
This volume is based on the lectures and selected posters on different aspects of biological effects of EMF, presented at the NATO Advanced Research W ...