لایه مرزی جوی: طبیعت، تئوری و برنامه به مدل سازی محیط ز ...
Atmospheric Boundary Layers: Nature, Theory, and Applic ......
پیشرفت در انجمن رمز ایران - ASIACRYPT 2003: نهمین کنفرا ...
Advances in Cryptology - ASIACRYPT 2003: 9th Internatio ......
پیشرفت در انجمن رمز ایران - ASIACRYPT 2008: 14 کنفرانس ...
Advances in Cryptology - ASIACRYPT 2008: 14th Internati ......
پیشرفت در انجمن رمز ایران – ASIACRYPT 2006: 12 کنفرانس ...
Advances in Cryptology – ASIACRYPT 2006: 12th Internati ......
پیشرفت در انجمن رمز ایران – ASIACRYPT 2007: سیزدهمین کن ...
Advances in Cryptology – ASIACRYPT 2007: 13th Internati ......
پیشرفت در انجمن رمز ایران – ASIACRYPT 2009: پانزدهمین ک ...
Advances in Cryptology – ASIACRYPT 2009: 15th Internati ......
بین المللی کنترل تریتیوم برای منع گسترش سلاح های هسته ا ...
International Control of Tritium for Nuclear Nonprolife ......
سیستم های کنترل دسترسی: امنیت، مدیریت هویت و اعتماد مدل
Access Control Systems: Security, Identity Management a ...
قرن 21 امنیت و CPTED: طراحی برای حفاظت از زیرساخت های ح ...
21st Century Security and CPTED: Designing for Critical ......
سوخت های زیستی زمین گرفتن و امنیت غذایی در آفریقا
Biofuels, Land Grabbing and Food Security in Africa
اتحاد بین عرب: امنیت رژیم و سیاست خارجه اردن
Inter-Arab Alliances: Regime Security and Jordanian For ...
ابراهیم اپستین: پدر فراموش شده از تامین اجتماعی
Abraham Epstein: The Forgotten Father of Social Securit ...
حاکمیت شرکتی و امنیت منابع در چین : دگرگونی منابع جهانی ...
Corporate Governance and Resource Security in China: Th ......
راهنمای عملی برای مدیریت امنیت اطلاعات (خانه Artech فن ...
A Practical Guide to Managing Information Security (Art ......
قدرت شکننده: استراتژی های انرژی برای امنیت ملی
Brittle Power: Energy Strategy for National Security
19 گناه مرگبار از نرم افزار امنیتی :: برنامه نویسی معای ...
19 Deadly Sins of Software Security: Programming Flaws ......
24 گناه مرگبار از نقص برنامه نویسی نرم افزار امنیتی و چ ...
24 Deadly Sins of Software Security Programming Flaws a ......
24 گناه کبیره از نرم افزار امنیتی: نقص های برنامه نویسی ...
24 Deadly Sins of Software Security: Programming Flaws ......
24 گناه مرگبار از نرم افزار امنیتی :: برنامه نویسی معای ...
24 Deadly Sins of Software Security: Programming Flaws ......
پیشرفت در امنیت و روش های پرداخت برای موبایل بازرگانی
Advances in Security and Payment Methods for Mobile Com ...
لایه های جوی مرز : طبیعت و کاربرد ...
Atmospheric Boundary Layers: Na ...
This collection of peer reviewed papers represents a concise, up-to-date summary of our current knowledge of planetary boundary layer (PBL) physics an ...
لایه مرزی جوی: طبیعت، تئوری و برن ...
Atmospheric Boundary Layers: Na ...
This volume presents peer-reviewed papers from the NATO Advanced Research Workshop on Atmospheric Boundary Layers held in April 2006. The papers are d ...
سیستم های کنترل دسترسی: امنیت، مد ...
Access Control Systems: Securit ...
Not much to say on this book except that I found it incomplete and lacking in practical processes, more studious than application oriented. I have rea ...
قرن 21 امنیت و CPTED: طراحی برای ...
21st Century Security and CPTED ...
Once overlooked as a minor and ineffective tactic in the mitigation and prevention of terrorism and violent crime, Crime Prevention Through Environmen ...
سوخت های زیستی زمین گرفتن و امنیت ...
Biofuels, Land Grabbing and Foo ...
Energy crises and climate change have generated global demands for alternative non-fossil fuel sources. This has led to a rapid increase of investment ...
اتحاد بین عرب: امنیت رژیم و سیاست ...
Inter-Arab Alliances: Regime Se ...
The topic of international relations in the Arab world is as complex as it is important. Ryan gives the reader the theoretical background, and shows i ...
ابراهیم اپستین: پدر فراموش شده از ...
Abraham Epstein: The Forgotten ...
Social Security has long been called the third rail of American politics—an unassailable institution for which we can thank Franklin Delano Roosevelt ...
حاکمیت شرکتی و امنیت منابع در چین ...
Corporate Governance and Resour ...
Corporate governance has become a household term and investors across the world are demanding more transparency and accountability from controllers of ...
AAA هویت مدیریت امنیت
AAA Identity Management Securit ...
Cisco's complete, authoritative guide to Authentication, Authorization, and Accounting (AAA) solutions with CiscoSecure ACS AAA solutions are very f ...
19 گناه مرگبار از نرم افزار امنیت ...
19 Deadly Sins of Software Secu ...
Use this hands-on-guide to secure your software by eliminating code vulnerabilities from the start. This book is essential for all software developers ...
24 گناه کبیره از نرم افزار امنیتی ...
24 Deadly Sins of Software Secu ...
"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers ...
24 گناه مرگبار از نرم افزار امنیت ...
24 Deadly Sins of Software Secu ...
"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers ...
پیشرفت در امنیت و روش های پرداخت ...
Advances in Security and Paymen ...
Recently, the emergence of wireless and mobile networks has made possible the admission of electronic commerce to a new application and research subje ...
جهان نا امنی: دیدگاه انسان شناسی ...
A World of Insecurity: Anthropo ...
Human security is a key element in the measure of well-being and is a hot topic in anthropology and development studies. A World of Insecurity outline ...