نتایج جستجو
Software psychology: Human factors in computer and information systems
Ben Shneiderman, 1980
Advances in Intelligent Information Systems
Zbigniew W. Ras, Li-Shiang Tsay, 2009
Artificial Intelligence and Integrated Intelligent Information Systems: Emerging Technologies and Applications
Xuan F. Zha, Xuan F. Zha, 2006
Computer and Information Science
Roger Lee, 2013
Conceptual Structures: From Information to Intelligence: 18th International Conference on Conceptual Structures, ICCS 2010, Kuching, Sarawak, Malaysia, July 26-30, 2010. Proceedings
Michel Chein (auth.), Madalina Croitoru, Sébastien Ferré, Dickson Lukose (eds.), 2010
Information Modelling and Knowledge Bases Xiii
Hannu Kangassalo, 2002
Information Modelling and Knowledge Bases XIV
Hannu Jaakkola, 2003
Information Modelling and Knowledge Bases XV
Yasushi Kiyoki, Yasushi Kiyoki, Eiji Kawaguchi, Hannu Jaakkola, Hannu Kangassalo, 2004
Information Modelling and Knowledge Bases XVII
J. Henno, H. Jaakkola Y. Kiyoki, 2006
Information Modelling and Knowledge Bases XVIII
M. DuzaÂ, H. Jaakkola, Y. Kiyoki and H. Kangassalo, Editors, 2007
Information Modelling and Knowledge Bases XX
Y. Kiyoki, Y. Kiyoki, T. Tokuda, H. Jaakkola, X. Chen, N. Yoshida, 2009
Advances in Cryptology — ASIACRYPT 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001 Proceedings
Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo (auth.), Colin Boyd (eds.), 2001
Advances in Cryptology — ASIACRYPT 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security Queenstown, New Zealand, December 1–5, 2002 Proceedings
Arjen K. Lenstra, Adi Shamir, Jim Tomlinson (auth.), Yuliang Zheng (eds.), 2002
Advances in Cryptology — ASIACRYPT’98: International Conference on the Theory and Application of Cryptology and Information Security Beijing, China, October 18–22, 1998 Proceedings
Arjen K. Lenstra (auth.), Kazuo Ohta, Dingyi Pei (eds.), 1998
Boolean Functions in Cryptology and Information Security
O.A. Logachev, 2008
Disappearing cryptography: information hiding: steganography & watermarking
Peter Wayner, 2008
Information Security and Cryptology - ICISC 2007: 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedings
Willi Geiselmann, Rainer Steinwandt (auth.), Kil-Hyun Nam, Gwangsoo Rhee (eds.), 2007
Information Security and Cryptology – ICISC 2008: 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers
Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai (auth.), Pil Joong Lee, Jung Hee Cheon (eds.), 2009
Information Security and Cryptology: First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedings
Serge Vaudenay (auth.), Dengguo Feng, Dongdai Lin, Moti Yung (eds.), 2005
Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers
Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern (auth.), Dingyi Pei, Moti Yung, Dongdai Lin, Chuankun Wu (eds.), 2008
Modern Cryptography: Applied Mathematics for Encryption and Information Security
Chuck Easttom, 2015
CISA: Certified Information Systems Auditor Study Guide
David L. Cannon, Timothy S. Bergmann, Brady Pamplin, 2006
