THE HORN OF AFRICA INTRA-STATE AND INTER-STATE CONFLICTS AND SECURITY
REDIE BEREKETEAB2013 年出版208 页ISBN:0745333125
chapman & hall/crc cryptography and network security handbook on soft computing for video surveilla
sankar k.pal2012 年出版318 页ISBN:
The Making of Chinese Foreign and Security Policy in the Era of Reform 1978-2000
David M.Lampton2001 年出版508 页ISBN:0804740569
Once More Unto The Breach Managing Information Security In An Uncertain World Second Edition
Andrea C Simmons2015 年出版230 页ISBN:9781849287081
ECONOMIC SECURITY IN ELANESIA:KEY ISSUES FOR MANAGING CONTRACT STABILITY AND MINERAL RESOURCES DEVEL
P.A.MCGAVIN2222 年出版94 页ISBN:0866381597
翻译的文化操控 胡适的改写与新文化的建构 Hu Shi's rewritings and the construction of a new culture
赵文静著2006 年出版398 页ISBN:7309053095
本书是翻译理论模式与翻译案例互动的研究,通过胡适案例的研究印证了改写理论的适用性。
Lecture Notes in Computer Science 4817 Information Security and Cryptology-ICISC 2007 10th Internati
2007 年出版368 页ISBN:9783540767879
Lecture Notes in Computer Science 4734 Computer Security ESORICS 2007 12th European Symposium on Res
2007 年出版628 页ISBN:9783540748342
Lecture Notes in Computer Science 2288 Information Security and Cryptology-ICISC 2001 4th Internatio
2002 年出版457 页ISBN:3540433198