-
«1075 عنوان»
- همه (1075)
- مقاطع تحصیلی (1)
- کتب و مجلات (882)
- آموزشی (1)
- نرم افزار (179)
- فیلمهای آموزشی (13)
پیشرفت در رمز - EUROCRYPT 2010 : 29 کنفرانس سالانه بین ...
Advances in Cryptology - EUROCRYPT 2010: 29th Annual In ......
سفارشات مرگ: پیشتاز مدرن تروریسم در انقلاب روسیه ( Prae ...
Death Orders: The Vanguard of Modern Terrorism in Revol ......
حفاظت از زیرساختهای انرژی و امنیت داخلی
Energy Infrastructure Protection and Homeland Security
اطلاعات و امنیت ارتباطات: 12 کنفرانس بین المللی ICICS 2 ...
Information and Communications Security: 12th Internati ......
نقش بیماری شناسی گیاهی در ایمنی مواد غذایی و امنیت غذای ...
The Role of Plant Pathology in Food Safety and Food Sec ......
توسعه کسب و کار امنیت دیجیتال: فن آوری های مدیریت
Digital Business Security Development: Management Techn ...
چند کارخانه ایمنی و مدیریت امنیت در صنایع شیمیایی و فرآ ...
Multi-Plant Safety and Security Management in the Chemi ......
ترویج شیمیایی ایمنی و امنیت آزمایشگاهی در کشورهای در حا ...
Promoting Chemical Laboratory Safety and Security in De ......
ایمنی کامپیوتر، قابلیت اطمینان، و امنیت: 29 کنفرانس بین ...
Computer Safety, Reliability, and Security: 29th Intern ......
کتاب بر اساس محل سکونت خدمات: نرم افزار، فن آوری و امنی ...
Location-Based Services Handbook: Applications, Technol ......
توجیه موشک بالستیک دفاع : فناوری ، امنیت و فرهنگ (مطالع ...
Justifying Ballistic Missile Defence: Technology, Secur ......
امنیت فناوری ، بازیابی و تداوم کسب و کار : همایش بین ال ...
Security Technology, Disaster Recovery and Business Con ......
Symantec Mail Security for Micr ...
Symantec Mail Security for Microsoft Exchange provides real- time protection for email against viruses, spam, spyware, phishin ...
Symantec Mail Security for Micr ...
Symantec Mail Security for Microsoft Exchange provides real- time protection for email against viruses, spam, spyware, phishin ...
پیشرفت در رمز - EUROCRYPT 2010 : ...
Advances in Cryptology - EUROCR ...
This book constitutes the refereed proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, ...
سفارشات مرگ: پیشتاز مدرن تروریسم ...
Death Orders: The Vanguard of M ...
Arguing that Russia is the birthplace of modern terrorism, Death Orders: The Vanguard of Modern Terrorism in Revolutionary Russia uses the nation as a ...
امنیت زنجیره غذایی
Food Chain Security
This volume addresses a wide range of issues related to food terrorism, food security and safety in a comprehensive and up-to-date survey. Emerging is ...
حفاظت از زیرساختهای انرژی و امنیت ...
Energy Infrastructure Protectio ...
In the post-9/11 world, the possibility of energy infrastructure-terrorism_the use of weapons to cause devastating damage to the energy industrial sec ...
اطلاعات و امنیت ارتباطات: 12 کنفر ...
Information and Communications ...
This book constitutes the refereed proceedings of the 12th International Conference on Information and Communications Security, ICICS 2010, held in Ba ...
نقش بیماری شناسی گیاهی در ایمنی م ...
The Role of Plant Pathology in ...
This book views the vulnerability of our crops in general to devastating diseases as well as specifically the disease problems of two important staple ...
توسعه کسب و کار امنیت دیجیتال: فن ...
Digital Business Security Devel ...
دان کرویکشانگ (انگلیسی: Dan Cruickshank؛ زادهٔ ۲۶ اوت ۱۹۴۹(1949-08-26)) یک معمار اهل بریتانیا است.
چند کارخانه ایمنی و مدیریت امنیت ...
Multi-Plant Safety and Security ...
This practical text serves as a guide to elaborating and determining the principles, assumptions, strengths, limitations and areas of application for ...
کتاب بر اساس محل سکونت خدمات: نرم ...
Location-Based Services Handboo ...
Location-Based Services Handbook: Applications, Technologies, and Security is a comprehensive reference containing all aspects of essential technical ...
توجیه موشک بالستیک دفاع : فناوری ...
Justifying Ballistic Missile De ...
Technology is championed as the solution to modern security problems, but also blamed as their cause. This book assesses the way in which these two vi ...
امنیت فناوری ، بازیابی و تداوم کس ...
Security Technology, Disaster R ...
Welcome to the proceedings of the 2010 International Conferences on Security Te- nology (SecTech 2010), and Disaster Recovery and Business Continuity ...
امنیت و حریم خصوصی در شبکه های ار ...
Security and privacy in communi ...
This book constitutes the thoroughly refereed proceedings of the 6th International ICST Conference, SecureComm 2010, held in Singapore in September 20 ...
تست نفوذ: (تحلیلگر EC-شورای خبره ...
Penetration Testing: Communicat ...
The Security Analyst Series from EC-Council | Press is comprised of five books covering a broad base of topics in advanced penetration testing and inf ...
Increasing age- and sex-specifi ...
Summary This study, characterising the incidence of hip fracture in Mexico, showed that age- and sex-specific rates increased between 2000 and 2006. ...
Loop security and tensile prope ...
Tensile and knot properties of new generation (polyblend) and traditional suture materials in orthopedic surgery were investigated in standard labor ...
Computer safety, reliability, a ...
Session 1 System Analysis Reliability Analysis of Safety-Related Communication Architectures . . . . 1 Oliver Schulz and Jan Peleska A Novel HAZOP ...
Multi-plant safety and security ...
Introduction -- Chemical risks in a multi-plant context -- A multi-plant safety and security culture: the requirements -- A multi-plant safety and ...
Food security, nutrition and su ...
Introduction: food security, nutrition and sustainability in a globalized world / Geoffrey lawrence, Kristen Lyons and Tabatha Wallington -- Breadbas ...
Critical infrastructure : homel ...
1. Introduction to critical infrastructure assurance -- 2. Demand, capacity, and fragility and the emergence of networks -- 3. National response fra ...