لایه های جوی مرز : طبیعت و کاربردهای آن به محیط زیست و ...
Atmospheric Boundary Layers: Nature, Theory and Applica ......
لایه مرزی جوی: طبیعت، تئوری و برنامه به مدل سازی محیط ز ...
Atmospheric Boundary Layers: Nature, Theory, and Applic ......
پیشرفت در انجمن رمز ایران - ASIACRYPT 2003: نهمین کنفرا ...
Advances in Cryptology - ASIACRYPT 2003: 9th Internatio ......
پیشرفت در انجمن رمز ایران - ASIACRYPT 2008: 14 کنفرانس ...
Advances in Cryptology - ASIACRYPT 2008: 14th Internati ......
پیشرفت در انجمن رمز ایران – ASIACRYPT 2006: 12 کنفرانس ...
Advances in Cryptology – ASIACRYPT 2006: 12th Internati ......
پیشرفت در انجمن رمز ایران – ASIACRYPT 2007: سیزدهمین کن ...
Advances in Cryptology – ASIACRYPT 2007: 13th Internati ......
پیشرفت در انجمن رمز ایران – ASIACRYPT 2009: پانزدهمین ک ...
Advances in Cryptology – ASIACRYPT 2009: 15th Internati ......
سیستم های کنترل دسترسی: امنیت، مدیریت هویت و اعتماد مدل
Access Control Systems: Security, Identity Management a ...
قرن 21 امنیت و CPTED: طراحی برای حفاظت از زیرساخت های ح ...
21st Century Security and CPTED: Designing for Critical ......
سوخت های زیستی زمین گرفتن و امنیت غذایی در آفریقا
Biofuels, Land Grabbing and Food Security in Africa
ابراهیم اپستین: پدر فراموش شده از تامین اجتماعی
Abraham Epstein: The Forgotten Father of Social Securit ...
حاکمیت شرکتی و امنیت منابع در چین : دگرگونی منابع جهانی ...
Corporate Governance and Resource Security in China: Th ......
19 گناه مرگبار از نرم افزار امنیتی :: برنامه نویسی معای ...
19 Deadly Sins of Software Security: Programming Flaws ......
24 گناه کبیره از نرم افزار امنیتی: نقص های برنامه نویسی ...
24 Deadly Sins of Software Security: Programming Flaws ......
24 گناه مرگبار از نرم افزار امنیتی :: برنامه نویسی معای ...
24 Deadly Sins of Software Security: Programming Flaws ......
پیشرفت در امنیت و روش های پرداخت برای موبایل بازرگانی
Advances in Security and Payment Methods for Mobile Com ...
جهان نا امنی: دیدگاه انسان شناسی امنیت
A World of Insecurity: Anthropological Perspectives of ...
نمایندگی تجارت الکترونیک: راه حل های بازار، مسائل امنیت ...
E-Commerce Agents: Marketplace Solutions, Security Issu ......
تصویربرداری 3D برای ایمنی و امنیت (تصویربرداری محاسباتی ...
3D Imaging for Safety and Security (Computational Imagi ......
طراحی امنیت معماری راه حل
Designing Security Architecture ...
There is an invisible elephant in this book: your application. And, it sits at the center of every topic we touch in each chapter we present. This boo ...
معاصر امنیت و استراتژی
Contemporary Security and Strat ...
Conflicting Identities and Multiple Masculinities takes as its focus the construction of masculinity in Western Europe from the early Middle Ages unti ...
لایه های جوی مرز : طبیعت و کاربرد ...
Atmospheric Boundary Layers: Na ...
This collection of peer reviewed papers represents a concise, up-to-date summary of our current knowledge of planetary boundary layer (PBL) physics an ...
لایه مرزی جوی: طبیعت، تئوری و برن ...
Atmospheric Boundary Layers: Na ...
This volume presents peer-reviewed papers from the NATO Advanced Research Workshop on Atmospheric Boundary Layers held in April 2006. The papers are d ...
سیستم های کنترل دسترسی: امنیت، مد ...
Access Control Systems: Securit ...
Not much to say on this book except that I found it incomplete and lacking in practical processes, more studious than application oriented. I have rea ...
قرن 21 امنیت و CPTED: طراحی برای ...
21st Century Security and CPTED ...
Once overlooked as a minor and ineffective tactic in the mitigation and prevention of terrorism and violent crime, Crime Prevention Through Environmen ...
سوخت های زیستی زمین گرفتن و امنیت ...
Biofuels, Land Grabbing and Foo ...
Energy crises and climate change have generated global demands for alternative non-fossil fuel sources. This has led to a rapid increase of investment ...
ابراهیم اپستین: پدر فراموش شده از ...
Abraham Epstein: The Forgotten ...
Social Security has long been called the third rail of American politics—an unassailable institution for which we can thank Franklin Delano Roosevelt ...
حاکمیت شرکتی و امنیت منابع در چین ...
Corporate Governance and Resour ...
Corporate governance has become a household term and investors across the world are demanding more transparency and accountability from controllers of ...
AAA هویت مدیریت امنیت
AAA Identity Management Securit ...
Cisco's complete, authoritative guide to Authentication, Authorization, and Accounting (AAA) solutions with CiscoSecure ACS AAA solutions are very f ...
19 گناه مرگبار از نرم افزار امنیت ...
19 Deadly Sins of Software Secu ...
Use this hands-on-guide to secure your software by eliminating code vulnerabilities from the start. This book is essential for all software developers ...
24 گناه کبیره از نرم افزار امنیتی ...
24 Deadly Sins of Software Secu ...
"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers ...
24 گناه مرگبار از نرم افزار امنیت ...
24 Deadly Sins of Software Secu ...
"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers ...
پیشرفت در امنیت و روش های پرداخت ...
Advances in Security and Paymen ...
Recently, the emergence of wireless and mobile networks has made possible the admission of electronic commerce to a new application and research subje ...
جهان نا امنی: دیدگاه انسان شناسی ...
A World of Insecurity: Anthropo ...
Human security is a key element in the measure of well-being and is a hot topic in anthropology and development studies. A World of Insecurity outline ...
نمایندگی تجارت الکترونیک: راه حل ...
E-Commerce Agents: Marketplace ...
Among the many changes brought by the Internet is the emergence of electronic commerce over the Web. E-commerce activities, such as the online exchang ...
دفاع دیجیتال: تایید امنیت اطلاعات
DIGITAL DEFENSE: VERIFICATION O ...
Abstract: The basic objective of digital defense is to verify the security intelligence of a distributed computing system (DCS) so that the informatio ...
تصویربرداری 3D برای ایمنی و امنیت ...
3D Imaging for Safety and Secur ...
This book presents the thoroughly revised versions of lectures given by leading researchers during the Workshop on Advanced 3D Imaging for Safety and ...
موضوع امنیت کاربرد نظریه دلبستگی ...
A Matter of Security The Applic ...
A contemporary case-based discussion of ethical dilemmas faced by researchers in forensic mental health, this book offers useful guidance to anyone pl ...
امنیت اطلاعات و تضمین: کنفرانس بی ...
Information Security and Assura ...
This book constitutes the proceedings of the International Conference on Information Security and Assurance, held in Brno, Czech Republic in August 20 ...