تغییر اقلیم و امنیت غذایی: تطبیق کشاورزی به جهان گرمتر
Climate Change and Food Security: Adapting Agriculture ...
Spring Security 3.1
قوانین ایمیل : راهنمای کسب و کار و خط مشی های مدیریت ، ...
E-Mail Rules: A Business Guide to Managing Policies, Se ......
Anderson-Security
تاثیر آگاهی از تهدید امنیت اطلاعات در رفتارهای محافظتی ...
The impact of information security threat awareness on ......
راهنمای عملی برای مدیریت امنیت اطلاعات (خانه Artech فن ...
A Practical Guide to Managing Information Security (Art ......
امنیت شبکه فن آوری و راه حل (CCIE سری توسعه حرفه ای )
Network Security Technologies and Solutions (CCIE Profe ...
بررسی طراحی و معماری در سیستم هوش ...
Intelligent System for Informat ...
رشته های مرتبط: مهندسی فناوری اطلاعات و مهندسی کامپیوتر، امنیت اطلاعات، رایانش امن
Building the Infrastructure for ...
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This boo ...
Spring Security 3.1
Learn to leverage the power of Spring Security to keep intruders at bay through simple examples that illustrate real world problems. Each sample demon ...
Critical infrastructure : homel ...
Broken into 11 categories, the book begins with the first priority that must be considered in protecting critical infrastructure and follows with the ...
Security manager's guide t ...
I. Loss Prevention The Objective for Security and Safety Disaster Defined Loss Prevention: Safety and Security Defined The Role of the Loss-Prevention ...
Food security, nutrition and su ...
Introduction: food security, nutrition and sustainability in a globalized world / Geoffrey lawrence, Kristen Lyons and Tabatha Wallington -- Breadbas ...
Computer safety, reliability an ...
Invited Talk Software Reliability Engineering in Industry.................................................................1 J. D. Musa Assessment a ...
Safety and security in multiage ...
Table of Contents Methodological Approaches to High-Assurance Systems Towards Safe Coordination in Multi-agent Systems . . . . . . . . . . . . . . ...
قوانین ایمیل : راهنمای کسب و کار ...
E-Mail Rules: A Business Guide ...
E-mail management is a particularly serious business issue in the post-Enron, corporate fraud climate, with many legal and retention concerns related ...
Network Security A Beginner’s G ...
Security Smarts for the Self-Guided IT ProfessionalDefend your network against a wide range of existing and emerging threats. Written by a Certified I ...
Financial Cryptography and Data ...
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Secu ...
Anderson-Security
Poul Anderson was one of the most popular authors in SF. Born in 1921, he began his career in the Golden Age of SF in the 1950s, and was a regular con ...
Remote sensing of the atmospher ...
Spectroscopic measurements of tropospheric composition from satellite measurements in the ultraviolet and visible: steps toward continuous pollution m ...
Safety and security equipment a ...
Cover -- Contents -- 1 INTRODUCTION & METHODOLOGY -- 1.1 WHAT DOES THIS REPORT COVER? -- 1.2 HOW TO STRATEGICALLY EVALUATE TURKEY -- 1.3 LATENT D ...
تاثیر آگاهی از تهدید امنیت اطلاعا ...
The impact of information secur ...
رشته های مرتبط مهندسی کامپیوتر، فناوری اطلاعات گرایش های مرتبط امنیت اطلاعات مجله کامپیوترها در رفتار انسان – Computers in Human Behavior دانشگاه ...
Transportation infrastructure s ...
Preface. Acknowledgments. Chapter 1: Introduction. 1.1 Concept of Security. 1.2 Transportation and Security. 1.3 Security in the ITS Context. 1.4 Scop ...
Computer safety, reliability, a ...
Systems of Systems System of Systems Hazard Analysis Using Simulation and Machine Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
Stabilization, safety, and secu ...
Table of Contents Invited Talks Challenges in Personalizing and Decentralizing the Web: An Overview of GOSSPLE . . . . . . . . . . . . . . . . . . ...
امنیت شبکه فن آوری و راه حل (CCIE ...
Network Security Technologies a ...
Depending on where you are in your career is how I'm going to rate this book. If you are somewhat new to security, especially in the Cisco world, this ...
سیستم ها و علوم انسانی - برای ایم ...
Systems and Human Science - For ...
Our society keeps growing with a large number of complicated machines and systems, while we are spending our diverse lives. The number of aged people ...
از VoIP کتاب: نرم افزار، فن آوری، ...
VoIP Handbook: Applications, Te ...
The number of worldwide VoIP customers is well over 38 million and thanks to popularity of inexpensive, high quality services such as skype is project ...