عرض عادي
An exploration of cyberspace security R&D investment strategies for DARPA : "the day after-- in cyberspace II"
نوع المادة :![نص](/opac-tmpl/lib/famfamfam/BK.png)
- text
- unmediated
- volume
- 0833024523 (PBK)
- QA76.9.A25 A53 1996
نوع المادة | المكتبة الحالية | رقم الطلب | رقم النسخة | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
![]() |
UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | QA76.9.A25 A53 1996 (إستعراض الرف(يفتح أدناه)) | C.1 | Library Use Only | داخل المكتبة فقط | 30010000248794 |
Browsing UAE Federation Library | مكتبة اتحاد الإمارات shelves, Shelving location: General Collection | المجموعات العامة إغلاق مستعرض الرف(يخفي مستعرض الرف)
QA76.9.A25 A476 2007 The emergence of blogs as a fifth estate and their security implications / | QA76.9.A25 A52 2010 Seven deadliest USB attacks / | QA76.9.A25 A52 2010 Seven deadliest USB attacks / | QA76.9.A25 A53 1996 An exploration of cyberspace security R&D investment strategies for DARPA : "the day after-- in cyberspace II" | QA76.9.A25 A8246 2009 Security software development : assessing and managing security risks / | QA76.9.A25 A8246 2009 Security software development : assessing and managing security risks / | QA76.9.A25 B33 1995 The computer privacy handbook / |
"National Defense Research Institute."
"Prepared for the Defense Advanced Research Projects Agency."
At head of title: Rand.