-
«1075 عنوان»
- همه (1075)
- مقاطع تحصیلی (1)
- کتب و مجلات (882)
- آموزشی (1)
- نرم افزار (179)
- فیلمهای آموزشی (13)
Construction site security
Perimeter security
تسلط مامبو : تجارت الکترونیک ، قالب ها، ماژول توسعه ، S ...
Mastering Mambo: E-Commerce, Templates, Module Developm ......
راهنمای کسب و کار به امنیت اطلاعات : چگونه برای محافظت ...
A business guide to information security: how to protec ......
حملات تهاجمی نیمه روش جدیدی برای تجزیه و تحلیل امنیت سخ ...
Semi-invasive attacks A new approach to hardware secu ......
امنیت شبکه: کانون دانش ( مورگان کافمن سری در شبکه )
Network Security: A Practical Approach (The Morgan Kauf ...
سیستم ها و علوم انسانی - برای ایمنی، امنیت و قابلیت اعت ...
Systems and Human Science - For Safety, Security and De ......
راهنمای محلی بی سیم شبکه های: نرم افزار، فناوری، امنیت، ...
Handbook of Wireless Local Area Networks: Applications, ......
تکنیکهای اپتیکالی و دیجیتالی امنیت اطلاعات
Optical and Digital Techniques for Information Security
Remote sensing of the atmospher ...
Spectroscopic measurements of tropospheric composition from satellite measurements in the ultraviolet and visible: steps toward continuous pollution m ...
Risk analysis and the security ...
Pt. I. The treatment and analysis of risk -- 1. Risk -- 2. Vulnerability and threat identification -- 3. Risk measurement -- 4. Quantifying and pr ...
Tourism, security and safety : ...
Contents List of Contributors ix Prologue xiii Abraham Pizam and Yoel Mansfeld 1. Toward a Theory of Tourism Security 1 Abraham Pizam and Yoel Ma ...
Construction site security
Chapter 1: Overview Chapter 2: Threat Assessment and Risk Analysis Basics Chapter 3: Security Overview Chapter 4: The Security Survey Chapter 5: Perim ...
Perimeter security
Threat assessment and risk analysis basics -- Perimeter fence -- Protective barriers -- Security lighting -- Electronic access control -- Alarms: ...
تغییر آب و هوا و امنیت غذایی جهان ...
Climate Change and Global Food ...
n order to feed their burgeoning populations, developing nations will need to double cereal production by 2050. Lal (natural resources, The Ohio State ...
تسلط مامبو : تجارت الکترونیک ، قا ...
Mastering Mambo: E-Commerce, Te ...
I ordered this item and it was returned as undeliverable - at least twice.So I really can't comment other than that - the delivery system is not very ...
راهنمای کسب و کار به امنیت اطلاعا ...
A business guide to information ...
* Vital reading for all those concerned with protecting their companies from malicious and criminal activity, department managers to CXOs and risk man ...
حملات تهاجمی نیمه روش جدیدی برای ...
Semi-invasive attacks A new a ...
Книга по аппаратному взлому.Based on a dissertation submitted September 2004 by the author for the degree of Doctor of Philosophy to the University of ...
امنیت شبکه: کانون دانش ( مورگان ک ...
Network Security: A Practical A ...
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioner ...
سیستم ها و علوم انسانی - برای ایم ...
Systems and Human Science - For ...
Our society keeps growing with a large number of complicated machines and systems, while we are spending our diverse lives. The number of aged people ...
راهنمای محلی بی سیم شبکه های: نرم ...
Handbook of Wireless Local Area ...
Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards captures the current state of wireless LANs, and serves as ...
Climate change and global food ...
Preface................................................................................................ iii Contributors............................. ...
Facility manager's guide t ...
Table of Contents Foreword ............................................................................................ xiii Preface ............... ...
Information security risk analy ...
Effective Risk Analysis -- Qualitative Risk Analysis -- Value Analysis -- Other Qualitative Methods -- Facilitated Risk Analysis Process (FRAP) -- ...
Assessing and managing security ...
Sec. 1. Security concepts -- Using models -- Defining information security -- Information as an asset -- Understanding threat and its relation to ...
Systems and human science, for ...
Multiple participant decision making in societal and technological systems / K.W. Hipel and L. Fang -- Mathematical modeling for coping with uncertai ...
تکنیکهای اپتیکالی و دیجیتالی امن ...
Optical and Digital Techniques ...
کتاب “تکنیکهای اپتیکالی و دیجیتالی امنیت اطلاعات” به طور جامع نتایج تحقیقات و تکنولوژیهای بهکاربرده شده در امنیت، بازبینی، تشخیص، پیگیری و شناسایی ...
امنیت شبکه و رمزنگاری
Cryptography and Network Securi ...
در عصر ویروسها و هکرها، استراق سمع و تقلب الکترونیکی، امنیت جایگاه مهمی دارد. این راهنمای بروزشده قوی بحثی جامع پیرامون امنیت شبکه و رمزنگاری است که ...
طراحی و تایید از یک معماری امنیتی ...
Design and verification of a cr ...
Illustrating the use of C, with stress on portability and speed, this book provides a mathematical background to techniques in computer graphics, befo ...