-
«1075 عنوان»
- همه (1075)
- مقاطع تحصیلی (1)
- کتب و مجلات (882)
- آموزشی (1)
- نرم افزار (179)
- فیلمهای آموزشی (13)
رمزنگاری تصویر و ویدئو؛ از مدیریت حقوق دیجیتال تا ارتبا ...
Image and Video Encryption: From Digital Rights Managem ......
موضوع امنیت کاربرد نظریه دلبستگی به روانپزشکی و روان در ...
A Matter of Security The Application of Attachment Theo ......
رمزنگاری معماری امنیت : طراحی و تأیید
Cryptographic Security Architecture: Design and Verific ...
مدیریت امنیت کنونی از u0026 amp؛ مسائل اخلاقی از فناوری ...
Current Security Management & Ethical Issues of Informa ......
مدیریت امنیت کنونی از u0026 amp؛ مسائل اخلاقی از فناوری ...
Current security management & ethical issues of informa ......
قوانین ایمیل : راهنمای کسب و کار و خط مشی های مدیریت ، ...
E-Mail Rules: A Business Guide to Managing Policies, Se ......
قوانین پست الکترونیکی: یک راهنمای کسب و کار به سیاست ها ...
E-mail rules : a business guide to managing policies, s ......
فهرست شرکت و راهنمای اجرای امنیت: طراحی و اجرای دایرکتو ...
Enterprise Directory and Security Implementation Guide: ......
امنیت و ایمنی در لس آنجلس ساختمان بلند پس از 9 11
Security and Safety in Los Angeles High Rise Building A ...
Computer safety, reliability, a ...
Invited Talk Why Safety and Security Should and Will Merge . . . . . . . . . . . . . . . . . . . . . . 1 A. Pfitzmann Safety Cases The Deconstruct ...
Effective physical security 3rd ...
/ Louis A. Tyska -- 1. The Influence of Physical Design -- 2. Risk Assessment and Management -- 3. Designing Security with the Architects -- 4. Se ...
A matter of security : the appl ...
Foreword 7 Friedemann Pfäfflin, University of Ulm, and Gwen Adshead, Broadmoor Hospital Part I: Theory 1. The Developmental Roots of Violence in t ...
رمزنگاری تصویر و ویدئو؛ از مدیریت ...
Image and Video Encryption: Fro ...
رمزنگاری تصویر و ویدئو، یک مرور یکپارچه از روشهای رمزگذاری تصاویر و داده های ویدئویی را فراهم میکند. این کتاب به معرفی تکنیکهای مختلف از نقطه نظرهای ...
تجارت الکترونیک: کنترل و راهنمای ...
E-Commerce: A Control and Secur ...
Checklists, though mundane, are a key component of many jobs. They help ensure that key issues aren't overlooked, and they serve as guideposts for any ...
موضوع امنیت کاربرد نظریه دلبستگی ...
A Matter of Security The Applic ...
A contemporary case-based discussion of ethical dilemmas faced by researchers in forensic mental health, this book offers useful guidance to anyone pl ...
امنیتی بلند و آتش ایمنی زندگی
High-rise security and fire lif ...
High-Rise Security and Fire Life Safety servers as an essential took for building architects, building owners and property managers, security and fire ...
رمزنگاری معماری امنیت : طراحی و ت ...
Cryptographic Security Architec ...
A cryptographic security architecture is the collection of hardware and software that protects and controls the use of encryption keys and similar cry ...
مدیریت امنیت کنونی از u0026 amp؛ ...
Current Security Management &am ...
This scholarly examination of the ethical issues in information technology management covers basic details such as improving user education and develo ...
قوانین ایمیل : راهنمای کسب و کار ...
E-Mail Rules: A Business Guide ...
E-mail management is a particularly serious business issue in the post-Enron, corporate fraud climate, with many legal and retention concerns related ...
High-rise security and fire lif ...
High-Rise Building Development and Utilization -- High-Rise Assets and Security and Fire Life Safety Threats -- Security and Fire Life Safety Unique ...
Review of EPA homeland security ...
Contents EXECUTIVE SUMMARY 1 1 INTRODUCTION 3 2 ASSESSMENT 5 3 FINDINGS AND RECOMMENDATIONS 19 REFERENCES 23 APPENDIXES A STATEMENT OF TASK 25 ...
فهرست شرکت و راهنمای اجرای امنیت: ...
Enterprise Directory and Securi ...
The Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, ...
طراحی امنیت معماری راه حل
Designing Security Architecture ...
In a course, this book was used as teaching material in a class for computer security. The read, reminded me of speaking software to a hardware engine ...
Security and Safety in Los Ange ...
Preliminaries; Preface; Acknowledgments; Introduction; Determining Threats and Vulnerabilities; The Risk Reduction Matrix; A Layered Approach; Underst ...
Security and loss prevention 4t ...
About the Author ............................ xvii Preface............................................. xix Acknowledgments ........................ ...
Security planning & disaste ...
Guiding Principles in Plan Development -- The Role of the Information Security Program -- Getting Off on the Right Foot -- Establishing the Role of ...
Low voltage wiring : security/f ...
The Security Systems Business -- A Business Built on Contracts -- Estimating the Installation of Security Systems -- Managing a Security Systems Bu ...
اصول امنیت را برای تجارت الکترونی ...
Security Fundamentals for E-Com ...
If you're charged with maintaining the security of e-commerce sites, you need this unique book that provides an in-depth understanding of basic securi ...
راهنمای عملی برای تضمین امنیت اطل ...
A practical guide to security e ...
• Examines the impact of both accidental and malicious, intentional action and inaction• Defines the five major components of a comprehensive and effe ...
Emergency and security lighting
Part 1 Emergency Lighting Systems 1 Introduction 3 2 System selection 7 2.1 Self-contained systems 8 2.2 Small central systems 8 2.3 Large centra ...
پیشرفت در رمز - ASIACRYPT 2000 : ...
Advances in Cryptology — ASIACR ...
ASIACRYPT 2000 was the sixth annual ASIACRYPT conference. It was sp- sored by the International Association for Cryptologic Research (IACR) in - opera ...