جستجو در تک بوک با گوگل!


Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

The art of memory forensics: detectiong malware and threats in Windows, Linux, and Mac memory

Secure Wireless Sensor Networks: Threats and Solutions

The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

Honey, I Wrecked the Kids: When Yelling, Screaming, Threats, Bribes, Time-outs, Sticker Charts and Removing Privileges All Don Work

Management in Latin America: Threats and Opportunities in the Globalized World

Translational Criminology and Counterterrorism: Global Threats and Local Responses

Tropical Pinnipeds: Bio-Ecology, Threats and Conservation

Tropical Pinnipeds: Bio-Ecology, Threats and Conservation

Tropical Pinnipeds: Bio-Ecology, Threats and Conservation

Title: Tropical Pinnipeds: Bio-Ecology, Threats and Conservation | Author(s): Juan J. Alava | Publisher: CRC Press | Year: 2017 | Language: English | Pages: 325 | Size: 4 MB  | Extension: pdf 
Pinnipeds are a fascinating group of marine mammals that play a crucial role as apex predators and sentinels of the functioning and health of marine ecosystems. They are found in the most extreme environments from the Polar regions to the tropics. Pinnipeds are comprised of about 34 species, and of those at least 25% live permanently in tropical zones. This book reviews and updates current research on the biology, marine ecology, bio-monitoring, and conservation of tropical pinniped populations, including their behavior, anthropogenic stressors, and health. It also looks at…


Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures

Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures

Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures

Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing | Author(s): Levente Buttyan, Jean-Pierre Hubaux | Publisher: Cambridge University Press | Year: 2007 | Language: English | Pages: 192 | Size: 11 MB | Extension: pdf…


Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures

Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures

Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures

Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing | Author(s): Levente Buttyan, Jean-Pierre Hubaux | Publisher: Cambridge University Press | Year: 2007 | Language: English | Pages: 192 | Size: 11 MB | Extension: pdf…





تمامی حقوق و مطالب سایت برای تک بوک محفوظ است و هرگونه کپی برداری بدون ذکر منبع ممنوع می باشد.


فید نقشه سایت

تمامی حقوق برای سایت تک بوک محفوظ میباشد