نتایج جستجو
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Jonathan Zdziarski, 2012
Exercise Physiology: Kinanthropometry and Exercise Physiology Laboratory Manual 2nd Edition: Volume 2 Tests, Procedures and Data
R.G. Eston, Thomas Reilly, 2001
Kinanthropometry and Exercise Physiology Laboratory Manual, 2 : Physiology - Tests, Procedures and Data
Thomas Reilly; Roger Eston, 2008
Kinanthropometry and Exercise Physiology Laboratory Manual: Tests, Procedures and Data: Anthropometry
Thomas Reilly, Roger Eston, Roger Eston, Tom Reilly, 2008
Kinanthropometry and Exercise Physiology Laboratory Manual: Tests, Procedures and Data: Volume One: Anthropometry
Thomas Reilly, Roger Eston, 2008
Kinanthropometry and Exercise Physiology Laboratory Manual: Tests, Procedures and Data: Volume Two: Physiology
Thomas Reilly, Roger Eston, 2008
Exploration and Analysis of DNA Microarray and Protein Array Data
Dhammika Amaratunga, Javier Cabrera, 2004
UNIX and Perl to the Rescue! : A Field Guide for the Life Sciences (and Other Data-rich Pursuits)
Keith Bradnam; Ian Korf, 2012
Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings
Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi (auth.), Sara Foresti, Sushil Jajodia (eds.), 2010
Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings
Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi (auth.), Sara Foresti, Sushil Jajodia (eds.), 2010
Data and Applications Security and Privacy XXV: 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings
R. Sekar (auth.), Yingjiu Li (eds.), 2011
Data and Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings
Leendert van der Torre (auth.), Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia-Alfaro (eds.), 2012
Data and Applications Security and Privacy XXVIII: 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings
Vijay Atluri, Günther Pernul (eds.), 2014
Binary systems. Part 2: Elements and Binary Systems from B – C to Cr – Zr: Phase Diagrams, Phase Transition Data, Integral and Partial Quantities of Alloys
P. Franke, D. Neuschütz (auth.), P. Franke, D. Neuschütz (eds.), 2004
Information Technology Convergence, Secure and Trust Computing, and Data Management: ITCS 2012 & STA 2012
Carlos Juiz, Mercedes Gómez (auth.), Jong Hyuk (James) Park, Jongsung Kim, Deqing Zou, Yang Sun Lee (eds.), 2012
Communications and Multimedia Security. Advanced Techniques for Network and Data Protection: 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003. Proceedings
Alwyn Goh, David C. L. Ngo (auth.), Antonio Lioy, Daniele Mazzocchi (eds.), 2003
Communications and Multimedia Security. Advanced Techniques for Network and Data Protection: 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003. Proceedings
Alwyn Goh, David C. L. Ngo (auth.), Antonio Lioy, Daniele Mazzocchi (eds.), 2003
Algorithms and data structures in F and Fortran
Robin A. Vowels, 1999
Data mining and medical knowledge management: cases and applications
Petr Berka, Jan Rauch, Djamel Abdelkader Zighed, Petr Berka, Jan Rauch, Djamel Abdelkader Zighed, 2009
