نتایج جستجو

Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings
Qiong Huang, Duncan S. Wong, Yiming Zhao (auth.), Jonathan Katz, Moti Yung (eds.), 2007
Applied Cryptography and Network Security: 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings
Mark Manulis (auth.), Michel Abdalla, David Pointcheval, Pierre-Alain Fouque, Damien Vergnaud (eds.), 2009
Applied Cryptography and Network Security: First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003. Proceedings
Ventzislav Nikov, Svetla Nikova, Bart Preneel (auth.), Jianying Zhou, Moti Yung, Yongfei Han (eds.), 2003
Applied Cryptography and Network Security: Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings
Michael E. Locasto, Angelos D. Keromytis (auth.), Markus Jakobsson, Moti Yung, Jianying Zhou (eds.), 2004
Applied Cryptography and Network Security: Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedings
Jonathan Katz, Philip MacKenzie, Gelareh Taban (auth.), John Ioannidis, Angelos Keromytis, Moti Yung (eds.), 2005
Bayesian Network Technologies: Applications and Graphical Models
Ankush Mittal, Ankush Mittal; Ashraf Kassim, 2007
Be a Network Marketing Superstar: The One Book You Need to Make More Money Than You Ever Thought Possible
Mary Christensen, Wayne Christensen, 2007
Biodiversity in Drylands: Toward a Unified Framework (Long-Term Ecological Research Network Series)
Moshe Shachak, James R. Gosz, Stewart T. A. Pickett, Avi Perevolotsky, 2004
Biometrics for Network Security
Paul Reid, 2003
Boost.Asio C++ Network Programming
John Torjo, 2013
Broadband Network Traffic: Performance Evaluation and Design of Broadband Multiservice Networks
James Roberts, Ugo Mocci, Jorma Virtamo (eds.), 1996
Broadband Powerline Communications : Network Design
HalidHrasnica, 2004
Build Your Own Security Lab: A Field Guide for Network Testing
Michael Gregg, 2008
Build Your Own Security Lab: A Field Guide for Network Testing
Michael Gregg, 2008
Building a Cisco Network for WIndows 2000
Syngress, 2000
Building a Cisco Network for WIndows 2000
Melissa Craft, Elliot Lewis, et. al., 2000
Building a Cisco Network for Windows 2000
Melissa Craft, 2000
Beej's guide to network programming using Internet Sockets
Brian "Beej" Hall, 2005
Beej’s Guide to Network Programming Using Internet Sockets
Brian “Beej Jorgensen” Hall, 2005
Building a CISCO Network for Windows 2000
Scott Zimmerman, Tim Evans, 2000
CliffsNotes Setting Up a Windows 98 Home Network
Sue Plumley, 1999
Analysis of Microarray Data: A Network-Based Approach
Frank Emmert-Streib, Matthias Dehmer, 2008