شبکه نرم افزار : مجازی سازی ، SDN ، 5G ، امنیت
Software Networks: Virtualization, SDN, 5G, Security
امنیت شبکه: کانون دانش ( مورگان کافمن سری در شبکه )
Network Security: A Practical Approach (The Morgan Kauf ...
راهنمای عملی برای تضمین امنیت اطلاعات و مهندسی
A practical guide to security engineering and informati ...
کشف را 20 چیزهایی شما نمی دانستند که در مورد همه چیز: م ...
Discover's 20 Things You Didn't Know About Everything: ......
کشف را 20 چیزهایی شما نمی دانستند که در مورد همه چیز: م ...
Discover's 20 Things You Didn't Know About Everything: ......
امنیت سایبر: تجزیه و تحلیل ترافیک، فناوری و اتوماسیون
Cyber Security: Analytics, Technology and Automation
فاجعه ارتباطات در جهان رسانه ها حال تغییر (امنیت داخلی ...
Disaster Communications in a Changing Media World (Butt ......
اطلاعات و امنیت ارتباطات: 12 کنفرانس بین المللی ICICS 2 ...
Information and Communications Security: 12th Internati ......
قانون کامپیوتر و گزارش امنیتی. مخابرات پخش و قانون رقاب ...
Computer Law And Security Report. Telecommunications, b ......
خطرات تهدید کننده امنیت انرژی جهانی (ECE انرژی )
Emerging Global Energy Security Risks (Ece Energy)
حفاظت از زیرساختهای انرژی و امنیت داخلی
Energy Infrastructure Protection and Homeland Security
در مواجهه با تغییرات جهانی محیط زیست: محیط زیست، انسان، ...
Facing Global Environmental Change: Environmental, Huma ......
رهبری با مثال: چگونه ما می تواند انرژی و امنیت انقلاب ا ...
Leading by Example: How We Can Inspire an Energy and Se ......
سهم از زمین سنجش از راه دور برای تصمیم گیری در مورد امن ...
COntributions of land remote sensing for decisions abou ......
ایمنی و امنیت تجاری بودن سوخت هسته ای ذخیره سازی: گزارش ...
Safety and Security of Commercial Spent Nuclear Fuel St ......
تعادل باز بودن علمی و کنترل امنیت ملی در سلاح های هسته ...
Balancing Scientific Openness and National Security Con ......
فتح در فضای مجازی - امنیت ملی و جنگ اطلاعات
Conquest in Cyberspace - National Security and Informat ...
فتح در فضای مجازی : امنیت ملی و جنگ اطلاعات
Conquest in Cyberspace: National Security and Informati ...
شبکه نرم افزار : مجازی سازی ، SDN ...
Software Networks: Virtualizati ...
The goal of this book is to describe new concepts for Internet next generation. This architecture is based on virtual networking using Cloud and datac ...
شبکه نرم افزار : مجازی سازی ، SDN ...
Software Networks: Virtualizati ...
The goal of this book is to describe new concepts for Internet next generation. This architecture is based on virtual networking using Cloud and datac ...
امنیت شبکه: کانون دانش ( مورگان ک ...
Network Security: A Practical A ...
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioner ...
راهنمای عملی برای تضمین امنیت اطل ...
A practical guide to security e ...
• Examines the impact of both accidental and malicious, intentional action and inaction• Defines the five major components of a comprehensive and effe ...
کشف را 20 چیزهایی شما نمی دانستند ...
Discover's 20 Things You D ...
How much do you know about . . . Obesity Sleep Meteors Aliens Bees Sperm banks Sex in space Duct tape Germs Airport security Death Ancient weapons Rat ...
کشف را 20 چیزهایی شما نمی دانستند ...
Discover's 20 Things You D ...
How much do you know about . . . Obesity Sleep Meteors Aliens Bees Sperm banks Sex in space Duct tape Germs Airport security Death Ancient weapons Rat ...
امنیت شبکه های بی سیم Multihop
Security for Multihop Wireless ...
Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a dif ...
امنیت سایبر: تجزیه و تحلیل ترافیک ...
Cyber Security: Analytics, Tech ...
Contains a unique codification of cyber securityExcellent book for students, postgraduates and professionalsGives a profound overview of the most spok ...
فاجعه ارتباطات در جهان رسانه ها ح ...
Disaster Communications in a Ch ...
Communications is key to the success of disaster mitigation, preparedness, response and recovery. Accurate information disseminated to the general pub ...
اطلاعات و امنیت ارتباطات: 12 کنفر ...
Information and Communications ...
This book constitutes the refereed proceedings of the 12th International Conference on Information and Communications Security, ICICS 2010, held in Ba ...
قانون کامپیوتر و گزارش امنیتی. مخ ...
Computer Law And Security Repor ...
This groundbreaking work provides a one-stop source for all lawyers advising on the law of photography and digital images. Presenting commentary on al ...
خطرات تهدید کننده امنیت انرژی جها ...
Emerging Global Energy Security ...
This publication is the result of the analyses and discussions conducted by the Energy Security Forum on the global dimensions of emerging energy secu ...
حفاظت از زیرساختهای انرژی و امنیت ...
Energy Infrastructure Protectio ...
In the post-9/11 world, the possibility of energy infrastructure-terrorism_the use of weapons to cause devastating damage to the energy industrial sec ...
در مواجهه با تغییرات جهانی محیط ز ...
Facing Global Environmental Cha ...
The year 2007 could perhaps accurately be described as the year when climate change finally received the attention that this challenge deserves global ...
رهبری با مثال: چگونه ما می تواند ...
Leading by Example: How We Can ...
Global climate change? We can stop it.Addiction to oil?We can replace it.Technological innovation?We can create it.But we can't wait twenty, thirty, o ...
سهم از زمین سنجش از راه دور برای ...
COntributions of land remote se ...
Land remote sensing: the use of space-based satellite technologies to obtain information on environmental variables such as land-use and land-covering ...
امنیت زنجیره غذایی
Food Chain Security
This volume addresses a wide range of issues related to food terrorism, food security and safety in a comprehensive and up-to-date survey. Emerging is ...
ایمنی و امنیت تجاری بودن سوخت هست ...
Safety and Security of Commerci ...
In response to a request from Congress, the Nuclear Regulatory Commission and the Department of Homeland Security sponsored a National Academies study ...
تعادل باز بودن علمی و کنترل امنیت ...
Balancing Scientific Openness a ...
This report addresses consequences of current and proposed restrictions on international contacts by the U.S. Department of Energy ’s (DOE) national l ...
فتح در فضای مجازی - امنیت ملی و ج ...
Conquest in Cyberspace - Nation ...
With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Compu ...
فتح در فضای مجازی : امنیت ملی و ج ...
Conquest in Cyberspace: Nationa ...
With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Compu ...
طراحی امنیت معماری راه حل
Designing Security Architecture ...
In a course, this book was used as teaching material in a class for computer security. The read, reminded me of speaking software to a hardware engine ...
علوم زیستی و بیوتکنولوژی در روسیه ...
Biological Science And Biotechn ...
In July 2005, the National Academies released the report "Biological Science and Biotechnology in Russia: Controlling Diseases and Enhancing Security" ...
زنگ هشدار سنسور امنیتی مدار کتاب ...
Alarm Sensor Security Circuit C ...
This text is aimed at technicians, hobbyists, and students and provides complete circuit diagrams and building instructions for a wide range of creati ...
تجارت الکترونیک: کنترل و راهنمای ...
E-Commerce: A Control and Secur ...
Checklists, though mundane, are a key component of many jobs. They help ensure that key issues aren't overlooked, and they serve as guideposts for any ...