نتایج جستجو
Network centric warfare : developing and leveraging information superiority
David S Alberts; John Garstka; Frederick P Stein, 1999
Network Beyond Bias
Waninger, Amy C., 2018
AI and Blockchain Technology in 6G Wireless Network
Malaya Dutta Borah, Pushpa Singh, Ganesh Chandra Deka, 2022
AI and Blockchain Technology in 6G Wireless Network
Malaya Dutta Borah, Pushpa Singh, Ganesh Chandra Deka, 2022
MCSE: Windows 2000 Network Infrastructure Design Study Guide
William Heldman, 2002
The Internet Myth: From the Internet Imaginary to Network Ideologies
Paolo Bory, 2020
Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control
Daniel V. Hoffman, 2008
Hands-On Ethical Hacking and Network Defense (MindTap Course List)
Rob Wilson, 2022
Neural network learning and expert systems
Gallant S.I., 1993
Linux User & Developer 175 - Build the Perfect Network
April Madden, 2017
The End of Competition: The Impact of the Network Economy
Cor Molenaar, 2020
Network attacks and defenses : a hands-on approach
Zouheir Trabelsi; et al, 2013
Introduction to Network Emulation
Razvan Beuran, 2013
Network Science: 7th International Winter Conference, NetSci-X 2022, Porto, Portugal, February 8–11, 2022, Proceedings
Pedro Ribeiro, Fernando Silva, José Fernando Mendes, Rosário Laureano, 2022
Linux User & Developer 189 - Build the Perfect Network
Chris Thornett, 2018
Hybridization in Network Management
Adam Jabloński, 2019
Nmap 6: Network exploration and security auditing Cookbook
Calderon Pale Paulino, 2012
Nmap 6: Network exploration and security auditing Cookbook
Calderon Pale Paulino, 2012
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration
Michael Bender, 2009
Future Network Architectures And Core Technologies
Ju-long Lan, Yu-xiang Hu, Zhen Zhang, Yi-ming Jiang, Peng Wang, Jiang-xing Wu, 2022
From Rails to Trails: The Making of America's Active Transportation Network
Peter Harnik, 2021
Network and Application Security: Fundamentals and Practices
Debashis Ganguly, 2011
Network and application security : fundamentals and practices
Debashis Ganguly; Shibamouli Lahiri, 2012
