تحقیقات جرایم اینترنتی: پل زدن شکاف بین متخصصان امنیتی ...
Cyber Crime Investigations: Bridging the Gaps Between S ......
تحقیقات جرایم اینترنتی: پل زدن شکاف بین متخصصان امنیتی ...
Cyber Crime Investigations: Bridging the Gaps Between S ......
تغییر اقلیم و امنیت غذایی: تطبیق کشاورزی به جهان گرمتر
Climate Change and Food Security: Adapting Agriculture ...
تغییر اقلیم و امنیت غذایی: تطبیق کشاورزی به جهان گرمتر
Climate Change and Food Security: Adapting Agriculture ...
فناوری نانو نظامی: تکنولوژی جدید و کنترل تسلیحات ( مطال ...
Military Nanotechnology: New Technology and arms Contro ......
نیروگاه هسته ای ابزار دقیق و کنترل سیستم های ایمنی و ام ...
Nuclear Power Plant Instrumentation and Control Systems ......
آشنایی کلاسیک رمزنگاری - برنامه های کاربردی برای امنیت ...
A Classical Introduction to Cryptography - Applications ......
آشنایی کلاسیک رمزنگاری: برنامه های کاربردی برای امنیت ا ...
A Classical Introduction to Cryptography: Applications ......
امنیت عمومی در دولت مذاکره : پلیس در امریکا لاتین و فرا ...
Public Security in the Negotiated State: Policing in La ......
عصر اطلاعات گلچین : مفاهیم امنیت ملی عصر اطلاعات (جلد د ...
Information Age Anthology: National Security Implicatio ......
لایه های جوی مرز : طبیعت و کاربردهای آن به محیط زیست و ...
Atmospheric Boundary Layers: Nature, Theory and Applica ......
لایه مرزی جوی: طبیعت، تئوری و برنامه به مدل سازی محیط ز ...
Atmospheric Boundary Layers: Nature, Theory, and Applic ......
پیشرفت در انجمن رمز ایران - ASIACRYPT 2003: نهمین کنفرا ...
Advances in Cryptology - ASIACRYPT 2003: 9th Internatio ......
پیشرفت در انجمن رمز ایران - ASIACRYPT 2008: 14 کنفرانس ...
Advances in Cryptology - ASIACRYPT 2008: 14th Internati ......
پیشرفت در انجمن رمز ایران – ASIACRYPT 2006: 12 کنفرانس ...
Advances in Cryptology – ASIACRYPT 2006: 12th Internati ......
پیشرفت در انجمن رمز ایران – ASIACRYPT 2007: سیزدهمین کن ...
Advances in Cryptology – ASIACRYPT 2007: 13th Internati ......
پیشرفت در انجمن رمز ایران – ASIACRYPT 2009: پانزدهمین ک ...
Advances in Cryptology – ASIACRYPT 2009: 15th Internati ......
هواشناسی و امنیت انرژی : شبیه ساز ...
Meteorology and energy security ...
"Meteorological data is essential for both day-to-day energy management and for planning for the world's future energy security. The editor of this co ...
کتاب آشپزی امنیت لینوکس
Linux Security Cookbook
The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting ac ...
کتاب آشپزی امنیت لینوکس
Linux Security Cookbook
I picked this book up since it had a chapter on iptables however after reading more I found that this book is quite dated. Someone who is still runnin ...
کتاب آشپزی امنیت لینوکس
Linux Security Cookbook
Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ...
تحقیقات جرایم اینترنتی: پل زدن شک ...
Cyber Crime Investigations: Bri ...
Written by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking.The book be ...
تغییر اقلیم و امنیت غذایی: تطبیق ...
Climate Change and Food Securit ...
Roughly a billion people around the world continue to live in state of chronic hunger and food insecurity. Unfortunately, efforts to improve their liv ...
فناوری نانو نظامی: تکنولوژی جدید ...
Military Nanotechnology: New Te ...
With revolutionary changes in nanotechnology (NT) now on the horizon, many countries have started major research and development (R&D) programmes, whi ...
نیروگاه هسته ای ابزار دقیق و کنتر ...
Nuclear Power Plant Instrumenta ...
Accidents and natural disasters involving nuclear power plants such as Chernobyl, Three Mile Island, and the recent meltdown at Fukushima are rare, bu ...
آشنایی کلاسیک رمزنگاری - برنامه ه ...
A Classical Introduction to Cry ...
A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security b ...
آشنایی کلاسیک رمزنگاری: برنامه ها ...
A Classical Introduction to Cry ...
A Classical Introduction to Cryptography: ApplicationsВ for Communications Security introduces fundamentals of information and communication security ...
طراحی امنیت معماری راه حل
Designing Security Architecture ...
There is an invisible elephant in this book: your application. And, it sits at the center of every topic we touch in each chapter we present. This boo ...
معاصر امنیت و استراتژی
Contemporary Security and Strat ...
Conflicting Identities and Multiple Masculinities takes as its focus the construction of masculinity in Western Europe from the early Middle Ages unti ...
عصر اطلاعات گلچین : مفاهیم امنیت ...
Information Age Anthology: Nati ...
This is a continuation in the series of publications produced for the Center for Advanced Concepts and Technology (ACT), which was created as a "skunk ...
لایه های جوی مرز : طبیعت و کاربرد ...
Atmospheric Boundary Layers: Na ...
This collection of peer reviewed papers represents a concise, up-to-date summary of our current knowledge of planetary boundary layer (PBL) physics an ...
لایه مرزی جوی: طبیعت، تئوری و برن ...
Atmospheric Boundary Layers: Na ...
This volume presents peer-reviewed papers from the NATO Advanced Research Workshop on Atmospheric Boundary Layers held in April 2006. The papers are d ...
سیستم های کنترل دسترسی: امنیت، مد ...
Access Control Systems: Securit ...
Not much to say on this book except that I found it incomplete and lacking in practical processes, more studious than application oriented. I have rea ...