نتایج جستجو

Computer Network Security
Ali Sadiqui
A First Course in Network Science (Instructor's Edu Resource 1 of 3, Solution Manual) (Solutions)
Filippo Menczer, Santo Fortunato, Clayton A. Davis, 2020![A First Course in Network Science (Instructor's Edu Resource 2 of 3, Lectures [PPT])](http://cdn.ketabkoo.com/covers/15/1585390-n.jpg)
A First Course in Network Science (Instructor's Edu Resource 2 of 3, Lectures [PPT])
Filippo Menczer, Santo Fortunato, Clayton A. Davis, 2020![A First Course in Network Science (Instructor's Edu Resource last of 3, Lectures [Interactive,Mac])](http://cdn.ketabkoo.com/covers/15/1585392-n.jpg)
A First Course in Network Science (Instructor's Edu Resource last of 3, Lectures [Interactive,Mac])
Filippo Menczer, Santo Fortunato, Clayton A. Davis, 2020
Python Passive Network Mapping: P2nmap
Chet Hosmer, 2015
Telecommunication Network Economics: From Theory to Applications
Maille P., Tuffin B., 2014
Network flows and monotropic optimization
Rockafellar R.T., 1984
Network Thinking: Beyond Brockhaus Thinking
Ulrich Weinberg, 2017
Network Analysis And Synthesis
Franklin F. Kuo, 1966
Social Network Analysis
Galety et al, 2022
Social Network Analysis : Theory and Applications
Galety, Mohammad Gouse;Atroshi, Chiai Al;Balabantaray, Buni;Mohanty, Sachi Nandan;; Chiai Al Atroshi; Bunil Kumar Balabantaray; Sachi Nandan Mohanty, 2022
Foundations of Python Network Programming
John Goerzen, 2004
Glossar 2.0 zu Asyl und Migration : ein Instrument zur besseren vergleichbarkeit
European Commission. Directorate-General for Home Affairs.; European Migration Network (EMN), 2012
Professor Messer’s CompTIA N10-008 Network+ Course Notes
Professor Messer
Professor Messer’s CompTIA Network+ N10-007 Course Notes
Professor Messer
Passive Network Synthesis: An Approach to Classification
Alessandro Morelli, Malcolm C. Smith, 2019
Graph and Network Theory: An Applied Approach using Mathematica®
Michael A. Henning, Jan H. van Vuuren, 2022
Cryptography and Network Security: Principles and Practice, Global Edition
William Stallings, 2022
CompTIA Network+ Certification All-in-One Exam Guide
Scott Jernigan, 2022