نتایج جستجو
Competing on Supply Chain Quality: A Network Economics Perspective
Anna Nagurney, Dong Li (auth.), 2016
Cyber-Physical Attacks: A Growing Invisible Threat
George Loukas PhD in Network SecurityImperial CollegeUK; MEng in Electrical Engineering and Computer ScienceNTUAGreece, 2015
Advances in Multimedia and Network Information System Technologies
Tanja Woronowicz, Peter Hoffmann, Michael Boronowsky (auth.), Ngoc Thanh Nguyen, Aleksander Zgrzywa, Andrzej Czyżewski (eds.), 2010
Impact of Climate Change on Hydro-Energy Potential: A MCDM and Neural Network Approach
Mrinmoy Majumder, Apu K. Saha (auth.), 2016
Active Technologies for Network and Service Management: 10th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM’99 Zurich, Switzerland, October 11–13, 1999 Proceedings
Antonio Liotta, Graham Knight, George Pavlou (auth.), Rolf Stadler, Burkhard Stiller (eds.), 1999
Active Technologies for Network and Service Management: 10th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM’99 Zurich, Switzerland, October 11–13, 1999 Proceedings
Antonio Liotta, Graham Knight, George Pavlou (auth.), Rolf Stadler, Burkhard Stiller (eds.), 1999
Social Network Analysis Applied to Team Sports Analysis
Filipe Manuel Clemente, Fernando Manuel Lourenço Martins, Rui Sousa Mendes (auth.), 2016
Eleventh Hour Network+ Exam N10-004 Study Guide
Ido Dubrawsky, 2009
Hack Proofing Your Network
Ryan Russell, Dan Kaminsky, Rain Forest Puppy, Joe Grand, K2, David Ahmad, Hal Flynn, Ido Dubrawsky, Steve W. Manzuik, Ryan Permeh, 2002
How to cheat at securing your network
Ido Dubrawsky, 2007
Stealing the Network
Ryan Russell, Ido Dubrawsky, FX, Joe Grand, Tim Mullen, 2003
Mission, Inc.: The Practitioner's Guide to Social Enterprise (Social Venture Network)
Kevin Lynch, Julius Walls Jr, 2009
Biodiversity in Drylands: Toward a Unified Framework (Long-Term Ecological Research Network Series)
Moshe Shachak, James R. Gosz, Stewart T. A. Pickett, Avi Perevolotsky, 2004
Communications and Multimedia Security. Advanced Techniques for Network and Data Protection: 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003. Proceedings
Alwyn Goh, David C. L. Ngo (auth.), Antonio Lioy, Daniele Mazzocchi (eds.), 2003
Communications and Multimedia Security. Advanced Techniques for Network and Data Protection: 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003. Proceedings
Alwyn Goh, David C. L. Ngo (auth.), Antonio Lioy, Daniele Mazzocchi (eds.), 2003
Computational Social Network Analysis: Trends, Tools and Research Advances
Alessia D’Andrea, Fernando Ferri, Patrizia Grifoni (auth.), Ajith Abraham, Aboul-Ella Hassanien, Vaclav Sná¿el (eds.), 2010
Computational Social Network Analysis: Trends, Tools and Research Advances
Alessia D’Andrea, Fernando Ferri, Patrizia Grifoni (auth.), Ajith Abraham, Aboul-Ella Hassanien, Vaclav Sná¿el (eds.), 2010
Trends in Network and Communications: International Conferences, NeCOM, WeST, WiMoN 2011, Chennai, India, July 15-17, 2011. Proceedings
Sukumar Nandi, Aditya Yadav (auth.), David C. Wyld, Michal Wozniak, Nabendu Chaki, Natarajan Meghanathan, Dhinaharan Nagamalai (eds.), 2011
Network models and optimization: multiobjective genetic algorithm approach
Kaisa Miettinen, 2008
Network Models and Optimization: Multiobjective Genetic Algorithm Approach
Kaisa Miettinen PhD (auth.), 2008
Cryptography & Network Security (McGraw-Hill Forouzan Networking)
Behrouz Forouzan, 2007
Data Communications and Network
Forouzan, Behrouz, 2013
Sams Teach Yourself Network Troubleshooting in 24 Hours
Janathan Feldman, Jonathan Feldman, 1998
