نتایج جستجو
Information Extraction: Algorithms and Prospects in a Retrieval Context
Marie-Francine Moens, 2006
Cryptographic and Information Security Approaches for Images and Videos
S. Ramakrishnan, 2018
Cryptographic and Information Security Approaches for Images and Videos
S. Ramakrishnan, 2019
Text Data Management and Analysis: A Practical Introduction to Information Retrieval and Text Mining
ChengXiang Zhai, Sean Massung, 2016
Introduction à l’information quantique
Michel Le Bellac, 2005
The hacker ethic, and the spirit of the information age
Pekka Himanen, 2001
Parsing with Principles and Classes of Information
Paola Merlo, 1996
Saurashtra "aaytam" character information
C. K. Jeyakumar, 2003
The Psychology of Information Security
Leron Zinatullin [Leron Zinatullin], 2016
CIO Best Practices: Enabling Strategic Value With Information Technology
Gary Cokins, Karl D. Schubert, Michael H. Hugos, Randy Betancourt, Alyssa Farrell, Bill Flemming, Jonathan Hujsak, Joe Stenzel, 2011
Abstract Methods in Information Theory
Kakihara, Yūichirō, 2016
Renewables Information 2012.
Agency, International Energy; Development, Organisation for Economic Co-operation and, 2012
Management Information Systems
Raymond McLeod Jr; George P. Schell, 2006
Information and Communication Overload in the Digital Age
Rui Pedro Figueiredo Marques and Joao Carlos Lopes Batista, 2017
MEHARI: Principes fondamentaux et spécifications fonctionnelles
Club de la Sécurité de l’Information du Québec, 2017
Combinatorial Methods and Models: Rudolf Ahlswedes Lectures on Information Theory 4
Rudolf Ahlswede, 2017
Information is Beautiful
David McCandless, 2000
Cybersecurity Management Guidelines Ver 1.1
Ministry of Economy, Trade and Industry (METI), Independent Administrative Agency Information-technology Promotion Agency (IPA), 2016
