حملات تهاجمی نیمه روش جدیدی برای تجزیه و تحلیل امنیت سخ ...
Semi-invasive attacks A new approach to hardware secu ......
قانون کامپیوتر و گزارش امنیتی. مخابرات پخش و قانون رقاب ...
Computer Law And Security Report. Telecommunications, b ......
خطرات تهدید کننده امنیت انرژی جهانی (ECE انرژی )
Emerging Global Energy Security Risks (Ece Energy)
حفاظت از زیرساختهای انرژی و امنیت داخلی
Energy Infrastructure Protection and Homeland Security
در مواجهه با تغییرات جهانی محیط زیست: محیط زیست، انسان، ...
Facing Global Environmental Change: Environmental, Huma ......
رهبری با مثال: چگونه ما می تواند انرژی و امنیت انقلاب ا ...
Leading by Example: How We Can Inspire an Energy and Se ......
پویا امنیت سیستم هم پیوسته برق قدرت - جلد 1
Dynamic Security of Interconnected Electric Power Syste ...
سهم از زمین سنجش از راه دور برای تصمیم گیری در مورد امن ...
COntributions of land remote sensing for decisions abou ......
امنیت غذایی، فقر و تجزیه و تحلیل سیاست تغذیه: روش های آ ...
Food Security, Poverty and Nutrition Policy Analysis: S ......
ایمنی و امنیت تجاری بودن سوخت هسته ای ذخیره سازی: گزارش ...
Safety and Security of Commercial Spent Nuclear Fuel St ......
تعادل باز بودن علمی و کنترل امنیت ملی در سلاح های هسته ...
Balancing Scientific Openness and National Security Con ......
ایجاد توازن میان علمی باز بودن و کنترل امنیت ملی در آزم ...
Balancing Scientific Openness and National Security Con ......
فتح در فضای مجازی - امنیت ملی و جنگ اطلاعات
Conquest in Cyberspace - National Security and Informat ...
فتح در فضای مجازی : امنیت ملی و جنگ اطلاعات
Conquest in Cyberspace: National Security and Informati ...
علوم زیستی و بیوتکنولوژی در روسیه: بیماری های کنترل و E ...
Biological Science And Biotechnology in Russia: Control ......
راهنمای کسب و کار به امنیت اطلاعات : چگونه برای محافظت ...
A business guide to information security: how to protec ......
فهرست شرکت و راهنمای اجرای امنیت: طراحی و اجرای دایرکتو ...
Enterprise Directory and Security Implementation Guide: ......
اطلاعات و امنیت ارتباطات: 12 کنفر ...
Information and Communications ...
This book constitutes the refereed proceedings of the 12th International Conference on Information and Communications Security, ICICS 2010, held in Ba ...
حملات تهاجمی نیمه روش جدیدی برای ...
Semi-invasive attacks A new a ...
Книга по аппаратному взлому.Based on a dissertation submitted September 2004 by the author for the degree of Doctor of Philosophy to the University of ...
قانون کامپیوتر و گزارش امنیتی. مخ ...
Computer Law And Security Repor ...
This groundbreaking work provides a one-stop source for all lawyers advising on the law of photography and digital images. Presenting commentary on al ...
خطرات تهدید کننده امنیت انرژی جها ...
Emerging Global Energy Security ...
This publication is the result of the analyses and discussions conducted by the Energy Security Forum on the global dimensions of emerging energy secu ...
حفاظت از زیرساختهای انرژی و امنیت ...
Energy Infrastructure Protectio ...
In the post-9/11 world, the possibility of energy infrastructure-terrorism_the use of weapons to cause devastating damage to the energy industrial sec ...
در مواجهه با تغییرات جهانی محیط ز ...
Facing Global Environmental Cha ...
The year 2007 could perhaps accurately be described as the year when climate change finally received the attention that this challenge deserves global ...
رهبری با مثال: چگونه ما می تواند ...
Leading by Example: How We Can ...
Global climate change? We can stop it.Addiction to oil?We can replace it.Technological innovation?We can create it.But we can't wait twenty, thirty, o ...
سهم از زمین سنجش از راه دور برای ...
COntributions of land remote se ...
Land remote sensing: the use of space-based satellite technologies to obtain information on environmental variables such as land-use and land-covering ...
امنیت زنجیره غذایی
Food Chain Security
This volume addresses a wide range of issues related to food terrorism, food security and safety in a comprehensive and up-to-date survey. Emerging is ...
ایمنی و امنیت تجاری بودن سوخت هست ...
Safety and Security of Commerci ...
In response to a request from Congress, the Nuclear Regulatory Commission and the Department of Homeland Security sponsored a National Academies study ...
تعادل باز بودن علمی و کنترل امنیت ...
Balancing Scientific Openness a ...
This report addresses consequences of current and proposed restrictions on international contacts by the U.S. Department of Energy ’s (DOE) national l ...
فتح در فضای مجازی - امنیت ملی و ج ...
Conquest in Cyberspace - Nation ...
With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Compu ...
فتح در فضای مجازی : امنیت ملی و ج ...
Conquest in Cyberspace: Nationa ...
With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Compu ...
طراحی امنیت معماری راه حل
Designing Security Architecture ...
In a course, this book was used as teaching material in a class for computer security. The read, reminded me of speaking software to a hardware engine ...
علوم زیستی و بیوتکنولوژی در روسیه ...
Biological Science And Biotechn ...
In July 2005, the National Academies released the report "Biological Science and Biotechnology in Russia: Controlling Diseases and Enhancing Security" ...
زنگ هشدار سنسور امنیتی مدار کتاب ...
Alarm Sensor Security Circuit C ...
This text is aimed at technicians, hobbyists, and students and provides complete circuit diagrams and building instructions for a wide range of creati ...
راهنمای کسب و کار به امنیت اطلاعا ...
A business guide to information ...
* Vital reading for all those concerned with protecting their companies from malicious and criminal activity, department managers to CXOs and risk man ...
تجارت الکترونیک: کنترل و راهنمای ...
E-Commerce: A Control and Secur ...
Checklists, though mundane, are a key component of many jobs. They help ensure that key issues aren't overlooked, and they serve as guideposts for any ...
فهرست شرکت و راهنمای اجرای امنیت: ...
Enterprise Directory and Securi ...
The Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, ...
تسلط مامبو : تجارت الکترونیک ، قا ...
Mastering Mambo: E-Commerce, Te ...
I ordered this item and it was returned as undeliverable - at least twice.So I really can't comment other than that - the delivery system is not very ...
اصول امنیت را برای تجارت الکترونی ...
Security Fundamentals for E-Com ...
If you're charged with maintaining the security of e-commerce sites, you need this unique book that provides an in-depth understanding of basic securi ...