معتاد به نفت: آمریکا درایو های بی امان برای امنیت انرژی
Addicted to Oil: America's Relentless Drive for Energy ...
اعلامیه استقلال انرژی: چگونه آزادی از نفت خارجی بهبود ا ...
A Declaration of Energy Independence: How Freedom from ......
گاساتا (GASATA) یک الگوریتم ژنتیکی به عنوان ابزاری جایگ ...
GasSATA, a Genetic Algorithm. as an Alternative Tool. f ......
فناوری اطلاعات (IT) نرم افزار امنیتی در هنگ کنگ: مرجع ا ...
Information Technology (IT) Security Software in Hong K ......
Anderson-Security
OpenStack Cloud Security
NTP Security
Spring Security 3.1
JavaScript Security
سیاست خارجی و دیپلماسی آفریقایی ا ...
African Foreign Policy and Dipl ...
African statehood predates that of Europe, as well as the rest of Western civilization, and yet by imposing Western values on Africa and its peoples, ...
معتاد به نفت: آمریکا درایو های بی ...
Addicted to Oil: America's ...
The book begins with some good definitions that guide the global oil industry. In terms of "energy grades" oil is a clear winner for powering Large In ...
اعلامیه استقلال انرژی: چگونه آزاد ...
A Declaration of Energy Indepen ...
Every American should read "A Declaration of Energy Independence: How Freedom from Foreign Oil Can Improve National Security, Our Economy, and the Env ...
گاساتا (GASATA) یک الگوریتم ژنتیک ...
GasSATA, a Genetic Algorithm. a ...
رشته های مرتبط مهندسی کامپیوتر، برنامه نویسی کامپیوتر و مهندسی الگوریتم ها و محاسبات ۲- استفاده از الگوریتم های ژنتیکی برای تشخیص سوء استفاده الگوریتم ...
Cisco Next-Generation Security ...
Network threats are emerging and changing faster than ever before. Cisco Next-Generation Network Security technologies give you all the visibility and ...
CompTIA Security+ Practice Test ...
1,000 Challenging practice questions for Exam SY0-501 CompTIA Security+ Practice Tests provides invaluable practice for candidates preparing for Exam ...
Network Security Through Data A ...
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this p ...
CompTIA Security+ Review Guide, ...
Consolidate your knowledge base with critical Security+ review CompTIA Security+ Review Guide, Fourth Edition, is the smart candidate’s secret weapon ...
Pro iOS Security and Forensics
Examine how to keep iOS devices safe in the physical world, including creating company policies for iPhones; assessing and defending against cyber vul ...
CompTIA Security+: Get Certifie ...
The CompTIA Security+ Get Certified Get Ahead SY0-401 Study Guide is an update to the top-selling SY0-201 and SY0-301 study guides, which have helped ...
Radical Islam and International ...
by: Efraim Inbar, Hillel Frisch Radical Islam poses a political challenge in the modern world which is like that of no other radical religious movemen ...
Anderson-Security
Poul Anderson was one of the most popular authors in SF. Born in 1921, he began his career in the Golden Age of SF in the 1950s, and was a regular con ...
Practical Information Security ...
Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to ...
VMware View Security Essentials
Most people associate security with network security and focus on firewalls and network monitoring. However, there is more to security than that. Secu ...
OpenStack Cloud Security
OpenStack is a system that controls large pools of computing, storage, and networking resources, allowing its users to provision resources through a u ...
Hardware IP Security and Trust
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP c ...
NTP Security
Learn the risks associated with Network Time Protocol (NTP) security and how to minimize those risks while deploying and managing the protocol. You wi ...
Introduction to Hardware Securi ...
This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past ...
Practical Linux Security Cookbo ...
With the growing popularity of Linux, more and more administrators have started moving to the system to create networks or servers for any task. This ...
CCSP (ISC)2 Certified Cloud Sec ...
The only official study guide for the new CCSP exam CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide is your ultimate resource ...
Practical Internet of Things Se ...
With the advent of Intenret of Things (IoT), businesses will be faced with defending against new types of threats. The business ecosystem now includes ...
Pro PHP Security, 2nd Edition
PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the 2nd edition of this authoritative PHP security book covers foundational PHP ...
Spring Security 3.1
Learn to leverage the power of Spring Security to keep intruders at bay through simple examples that illustrate real world problems. Each sample demon ...
JavaScript Security
This book starts off with an introduction to JavaScript security and gives you an overview of the basic functions JavaScript can perform on the Web, b ...