-
«1075 عنوان»
- همه (1075)
- مقاطع تحصیلی (1)
- کتب و مجلات (882)
- آموزشی (1)
- نرم افزار (179)
- فیلمهای آموزشی (13)
امنیت گردشگری. استراتژی برای مدیریت موثر سفر خطر و ایمن ...
Tourism Security. Strategies for Effectively Managing T ......
هواشناسی و امنیت انرژی : شبیه سازی ، پیش بینی، و مدیریت
Meteorology and energy security : simulations, projecti ...
لایه مرزی جوی: طبیعت، تئوری و برنامه به مدل سازی محیط ز ...
Atmospheric Boundary Layers: Nature, Theory, and Applic ......
Security Intelligence
UMTS Security
Pro ASP.NET Web API Security
OpenStack Cloud Security
پیشگیری از جرم ، امنیت و جامعه ایمنی با استفاده از چارچ ...
Crime Prevention, Security and Community Safety Using t ......
حسابرسی امنیتی بی سیم: مسیر های حمله و استراتژی های کاه ...
Wireless Security Auditing: Attack Vectors and Mitigati ......
فرهنگ سازمانی، رویه اقدامات متقابل و رفتار امنیتی کارکن ...
Organisational Culture, Procedural Countermeasures,and ......
امنیت طرح امضای دیجیتال certificateless رایگان اشتراکی ...
On the security of pairing-free certificateless digital ......
Security Barrier
مدیریت اطلاعات راهبردی : ضرورت امنیت ملی و فناوری اطلاع ...
Strategic intelligence management : national security i ......
بررسی نقش مدیریت امنیت اطلاعات در سازمان های شهر هوشمند
Investigating the information security management role ...
حفاظت از زیرساختهای انرژی و امنیت داخلی
Energy Infrastructure Protection and Homeland Security
GlassFish Security
LTE Security
پیشرفت در رمز - ASIACRYPT 2000 : ...
Advances in Cryptology — ASIACR ...
ASIACRYPT 2000 was the sixth annual ASIACRYPT conference. It was sp- sored by the International Association for Cryptologic Research (IACR) in - opera ...
Cloud Management and Security
Written by an expert with over 15 years’ experience in the field, this book establishes the foundations of Cloud computing, building an in-depth and d ...
Visual Cryptography for Image P ...
This unique book describes the fundamental concepts, theories and practice of visual cryptography. The design, construction, analysis, and application ...
Computer Security Handbook, 6th ...
Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real ...
Professional ASP.NET 3.5 Securi ...
ASP.NET security covers concepts such as Web security, developing in partial trust, forms authentication, and securing configurationÂjust to name a f ...
امنیت گردشگری. استراتژی برای مدیر ...
Tourism Security. Strategies fo ...
Tourism security is an important part of both security management and tourism. Private security professionals and police departments in tourism cities ...
هواشناسی و امنیت انرژی : شبیه ساز ...
Meteorology and energy security ...
"Meteorological data is essential for both day-to-day energy management and for planning for the world's future energy security. The editor of this co ...
طراحی امنیت معماری راه حل
Designing Security Architecture ...
There is an invisible elephant in this book: your application. And, it sits at the center of every topic we touch in each chapter we present. This boo ...
لایه مرزی جوی: طبیعت، تئوری و برن ...
Atmospheric Boundary Layers: Na ...
This volume presents peer-reviewed papers from the NATO Advanced Research Workshop on Atmospheric Boundary Layers held in April 2006. The papers are d ...
Security Intelligence
Similar to unraveling a math word problem, Security Intelligence: A Practitioner’s Guide to Solving Enterprise Security Challenges guides you through ...
UMTS Security
Can you afford not to read this book?…The Universal Mobile Telecommunication System (UMTS) offers a consistent set of services to mobile computer and ...
Pro ASP.NET Web API Security
ASP.NET Web API is a key part of ASP.NET MVC 4 and the platform of choice for building RESTful services that can be accessed by a wide range of device ...
OpenStack Cloud Security
OpenStack is a system that controls large pools of computing, storage, and networking resources, allowing its users to provision resources through a u ...
حسابرسی امنیتی بی سیم: مسیر های ح ...
Wireless Security Auditing: Att ...
رشته های مرتبط حسابداری گرایش های مرتبط حسابرسی مجله پروسه علوم کامپیوتر – Procedia Computer Science دانشگاه Amrita School of Engineering – Amrita ...
فرهنگ سازمانی، رویه اقدامات متقاب ...
Organisational Culture, Procedu ...
رشته های مرتبط مدیریت، مهندسی صنایع گرایش های مرتبط مدیریت منابع انسانی و ایمنی صنعتی مجله امنیت اطلاعات و کامپیوتر – Information & Computer Securi ...
امنیت طرح امضای دیجیتال certifica ...
On the security of pairing-free ...
رشته های مرتبط مهندسی فناوری اطلاعات، مهندسی کامپیوتر گرایش های مرتبط امنیت اطلاعات، مهندسی نرم افزار، رایانش امن مجله بیان فناوری اطلاعات و ارتباط ...
Security Barrier
Format: OBJ, Collada (.obj, .dae) Security Barrier - rigged 3d model with textures Usage: Personal use only for: Educational purposes Fan art Game ...
Microsoft SQL Server 2012 Secur ...
Over 70 practical, focused recipes to bullet-proof your SQL Server database and protect it from hackers and security threats Practical, focused recipe ...
مدیریت اطلاعات راهبردی : ضرورت ام ...
Strategic intelligence manageme ...
This book introduces both academic researchers and law enforcement professionals to contemporary issues of national security and information managemen ...
بررسی نقش مدیریت امنیت اطلاعات در ...
Investigating the information s ...
رشته های مرتبط معماری، شهرسازی، مهندسی فناوری اطلاعات، مدیریت گرایش های مرتبط طراحی شهری، مدیریت فناوری اطلاعات مجله جهانی کارآفرینی، مدیریت و توس ...
حفاظت از زیرساختهای انرژی و امنیت ...
Energy Infrastructure Protectio ...
In the post-9/11 world, the possibility of energy infrastructure-terrorism_the use of weapons to cause devastating damage to the energy industrial sec ...
GlassFish Security
Security is driven by requirement and design and we implement security on the basis of the requirements provided by analysts. In this book, we take a ...
LTE Security
Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security su ...
رادیوی بدنه زمینی - TETRA : یک اب ...
TErrestrial Trunked RAdio - TET ...
Terrestrial Trunked Radio (TETRA) has become the tool to design any type of public security systems, in particular due to the strongly increased secur ...