بررسی طراحی و معماری در سیستم هوشمند مدیریت امنیت اطلاع ...
Intelligent System for Information Security Management: ......
"ROUND SECURITY CAM"
Security Fence
Security Barrier
اعلامیه استقلال انرژی: چگونه آزادی از نفت خارجی بهبود ا ...
A Declaration of Energy Independence: How Freedom from ......
معتاد به نفت: آمریکا درایو های بی امان برای امنیت انرژی
Addicted to Oil: America's Relentless Drive for Energy ...
سیاست خارجی و دیپلماسی آفریقایی از دوران باستان تا قرن ...
African Foreign Policy and Diplomacy from Antiquity to ......
جریان Bioelectromagnetics مفاهیم: مکانیسم اثر بیولوژیکی ...
Bioelectromagnetics Current Concepts: The Mechanisms of ......
هواشناسی و امنیت انرژی : شبیه سازی ، پیش بینی، و مدیریت
Meteorology and energy security : simulations, projecti ...
تحقیقات جرایم اینترنتی: پل زدن شکاف بین متخصصان امنیتی ...
Cyber Crime Investigations: Bridging the Gaps Between S ......
تحقیقات جرایم اینترنتی: پل زدن شکاف بین متخصصان امنیتی ...
Cyber Crime Investigations: Bridging the Gaps Between S ......
تغییر اقلیم و امنیت غذایی: تطبیق کشاورزی به جهان گرمتر
Climate Change and Food Security: Adapting Agriculture ...
تغییر اقلیم و امنیت غذایی: تطبیق کشاورزی به جهان گرمتر
Climate Change and Food Security: Adapting Agriculture ...
فناوری نانو نظامی: تکنولوژی جدید و کنترل تسلیحات ( مطال ...
Military Nanotechnology: New Technology and arms Contro ......
نیروگاه هسته ای ابزار دقیق و کنترل سیستم های ایمنی و ام ...
Nuclear Power Plant Instrumentation and Control Systems ......
آشنایی کلاسیک رمزنگاری - برنامه های کاربردی برای امنیت ...
A Classical Introduction to Cryptography - Applications ......
آشنایی کلاسیک رمزنگاری: برنامه های کاربردی برای امنیت ا ...
A Classical Introduction to Cryptography: Applications ......
گاساتا (GASATA) یک الگوریتم ژنتیک ...
GasSATA, a Genetic Algorithm. a ...
رشته های مرتبط مهندسی کامپیوتر، برنامه نویسی کامپیوتر و مهندسی الگوریتم ها و محاسبات ۲- استفاده از الگوریتم های ژنتیکی برای تشخیص سوء استفاده الگوریتم ...
بررسی طراحی و معماری در سیستم هوش ...
Intelligent System for Informat ...
رشته های مرتبط: مهندسی فناوری اطلاعات و مهندسی کامپیوتر، امنیت اطلاعات، رایانش امن
"ROUND SECURITY CAM"
Format: OBJ (.obj) 3D model called "ROUND SECURITY CAM". We offer several other free 3D models on our official web site. All models are created in AUT ...
Security Fence
Format: FBX (.fbx) Security Fence Textures included. Enjoy. Geometry Polygon Mesh Polygons 0 Vertices 0 Textures No Materials No Rigged No Animated N ...
Security Barrier
Format: OBJ, Collada (.obj, .dae) Security Barrier - rigged 3d model with textures Usage: Personal use only for: Educational purposes Fan art Game ...
اعلامیه استقلال انرژی: چگونه آزاد ...
A Declaration of Energy Indepen ...
Every American should read "A Declaration of Energy Independence: How Freedom from Foreign Oil Can Improve National Security, Our Economy, and the Env ...
معتاد به نفت: آمریکا درایو های بی ...
Addicted to Oil: America's ...
The book begins with some good definitions that guide the global oil industry. In terms of "energy grades" oil is a clear winner for powering Large In ...
سیاست خارجی و دیپلماسی آفریقایی ا ...
African Foreign Policy and Dipl ...
African statehood predates that of Europe, as well as the rest of Western civilization, and yet by imposing Western values on Africa and its peoples, ...
جریان Bioelectromagnetics مفاهیم: ...
Bioelectromagnetics Current Con ...
This volume is based on the lectures and selected posters on different aspects of biological effects of EMF, presented at the NATO Advanced Research W ...
هواشناسی و امنیت انرژی : شبیه ساز ...
Meteorology and energy security ...
"Meteorological data is essential for both day-to-day energy management and for planning for the world's future energy security. The editor of this co ...
کتاب آشپزی امنیت لینوکس
Linux Security Cookbook
The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting ac ...
کتاب آشپزی امنیت لینوکس
Linux Security Cookbook
I picked this book up since it had a chapter on iptables however after reading more I found that this book is quite dated. Someone who is still runnin ...
کتاب آشپزی امنیت لینوکس
Linux Security Cookbook
Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ...
تحقیقات جرایم اینترنتی: پل زدن شک ...
Cyber Crime Investigations: Bri ...
Written by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking.The book be ...
تغییر اقلیم و امنیت غذایی: تطبیق ...
Climate Change and Food Securit ...
Roughly a billion people around the world continue to live in state of chronic hunger and food insecurity. Unfortunately, efforts to improve their liv ...
فناوری نانو نظامی: تکنولوژی جدید ...
Military Nanotechnology: New Te ...
With revolutionary changes in nanotechnology (NT) now on the horizon, many countries have started major research and development (R&D) programmes, whi ...
نیروگاه هسته ای ابزار دقیق و کنتر ...
Nuclear Power Plant Instrumenta ...
Accidents and natural disasters involving nuclear power plants such as Chernobyl, Three Mile Island, and the recent meltdown at Fukushima are rare, bu ...
آشنایی کلاسیک رمزنگاری - برنامه ه ...
A Classical Introduction to Cry ...
A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security b ...
آشنایی کلاسیک رمزنگاری: برنامه ها ...
A Classical Introduction to Cry ...
A Classical Introduction to Cryptography: ApplicationsВ for Communications Security introduces fundamentals of information and communication security ...
طراحی امنیت معماری راه حل
Designing Security Architecture ...
There is an invisible elephant in this book: your application. And, it sits at the center of every topic we touch in each chapter we present. This boo ...
معاصر امنیت و استراتژی
Contemporary Security and Strat ...
Conflicting Identities and Multiple Masculinities takes as its focus the construction of masculinity in Western Europe from the early Middle Ages unti ...
عصر اطلاعات گلچین : مفاهیم امنیت ...
Information Age Anthology: Nati ...
This is a continuation in the series of publications produced for the Center for Advanced Concepts and Technology (ACT), which was created as a "skunk ...