|
|
Security considerations for voice over IP systems [electronic resource] : recommendations of the Nat : Kuhn, D. Richard.
|
2005
|
1
|
|
Security considerations in the system development life cycle [electronic resource]
|
2008
|
1
|
|
Security consulting : Sennewald, Charles A.,
|
2013
|
1
|
|
Security consumers or producers? : Hillison, Joel R.,
|
2009
|
1
|
|
Security continuum.
|
|
5
|
|
security controls
|
2014
|
1
|
|
Security controls evaluation, testing and assessment handbook
|
|
2
|
|
security controls from cobit and nist 800 53 : Watson, David
|
2013
|
1
|
|
Security convergence [electronic resource] : managing enterprise security risk : Tyson, Dave.
|
2007
|
1
|
|
Security convergence : managing enterprise security risk
|
|
2
|
|
security cooperation
|
2002
|
1
|
|
Security cooperation [electronic resource] : a key to the challenges of the 21st century : Dyekman, Gregory J.
|
2007
|
1
|
|
Security. Cooperation. Governance. : The Canada-United States open border paradox
|
2023
|
1
|
|
Security cooperation in Northeast Asia [electronic resource] : architecture and beyond
|
2012
|
1
|
|
security cooperation in the asia pacific region
|
2007
|
1
|
|
Security cooperation issues: fiscal year 2017 National Defense Authorization Act outcomes : Rosen, Liana W.,
|
2019
|
1
|
|
Security cooperation issues: FY2017 NDAA outcomes : Rosen, Liana W.,
|
2019
|
1
|
|
Security cooperation management
|
2020
|
1
|
|
Security cooperation with China [electronic resource] : analysis and a proposal : Wilborn, Thomas L.,
|
1994
|
1
|
|
The Security Council and the protection of human rights [electronic resource] : Ramcharan, B. G.
|
2002
|
1
|
|
security council dynamics and sanctions design
|
2016
|
1
|
|
Security data visualization [electronic resource] : graphical techniques for network analysis : Conti, Greg.
|
2007
|
1
|
|
Security, democracy, and development in U.S.-Latin American Relations
|
1994
|
1
|
|
The security demographic : population and civil conflict after the Cold War : Cincotta, Richard Paul.
|
2003
|
1
|
|
Security design consulting [electronic resource] : the business of security system design : Gouin, Brian.
|
2007
|
1
|
|
Security designs for the cloud, IoT, and social networking
|
2020
|
1
|
|
Security detention in international territorial administrations : Kosovo, East Timor, and Iraq : Direk, Omer Faruk,
|
2015
|
1
|
|
Security, development, and the fragile state [electronic resource] : bridging the gap between theory : Carment, David,
|
2010
|
1
|
|
The security development lifecycle : SDL, a process for developing demonstrably more secure software : Howard, Michael,
|
2006
|
1
|
|
Security developments in the areas of responsibility of the U.S. Pacific Command, U.S. European Comm : United States.
|
2010
|
1
|
|
Security developments in the areas of responsibility of the U.S. Southern Command, Northern Command, : United States.
|
2010
|
1
|
|
security dimension of gcc cohesion : Martini, Jeffrey,
|
2016
|
1
|
|
security dimensions of currency crises : Steil, Benn.
|
2006
|
1
|
|
Security directives and emergency amendments
|
2021
|
1
|
|
Security disarmed [electronic resource] : critical perspectives on gender, race, and militarization
|
2008
|
1
|
|
Security-driven design of real-time embedded systems : Jiang, Ke,
|
2016
|
1
|
|
Security during the Lifetime of a Nuclear Facility : Implementing Guide : IAEA,
|
2019
|
1
|
|
Security dynamics in the former Soviet bloc [electronic resource]
|
2003
|
1
|
|
The security dynamics of demographic factors [electronic resource] : Nichiporuk, Brian,
|
2000
|
1
|
|
The security, economic, and human rights relations dimensions of U.S.-Azerbaijan relations : hearing : United States.
|
2015
|
1
|
|
Security education, awareness, and training [electronic resource] : from theory to practice : Roper, C. A.
|
2006
|
1
|
|
Security [electronic resource]
|
2002
|
1
|
|
Security [electronic resource] : a multidisciplinary normative approach
|
2009
|
1
|
|
Security [electronic resource] : secrets, intruders and ID tags.
|
2003
|
1
|
|
Security [electronic resource] : the human factor : Kearney, Paul.
|
2010
|
1
|
|
Security engineering : a guide to building dependable distributed systems : Anderson, Ross,
|
2008
|
1
|
|
Security failures at the United States Capitol on January 6, 2021
|
2022
|
1
|
|
The security failures of Benghazi : hearing before the Committee on Oversight and Government Reform, : United States.
|
2012
|
1
|
|
Security first [electronic resource] : for a muscular, moral foreign policy : Etzioni, Amitai.
|
2007
|
1
|
|
Security for automotive electrical/electronic (E/E) architectures : Mundhenk, Philipp,
|
2017
|
1
|
Add Marked to Bag
Add All On Page
|