نتایج جستجو

The Official CHFI Study Guide (Exam 312-49). For Computer Hacking Forensics Investigators
Dave Kleiman, Kevin Cardwell, Timothy Clinton, Michael Cross, Michael Gregg, Jesse Varsalone and Craig Wright (Eds.), 2007
Photoshop 7 and Illustrator 10: Create Great Advanced Graphics
Dave Cross, Barry Huggins, Vicky Loader, Ian Tindale (auth.), 2002
Cross-linguistic corpora for the study of translations : insights from the language pair English-German
Katja Weber, Paul A. Kowert, 2012
Features, Categories and the Syntax of A-Positions: Cross-Linguistic Variation in the Germanic Languages
Eric Haeberli (auth.), 2002
Reliable Software for Unreliable Hardware: A Cross Layer Perspective
Semeen Rehman, Muhammad Shafique, Jörg Henkel (auth.), 2016
Cross-Cultural Risk Perception: A Survey of Empirical Studies
Bernd Rohrmann, Ortwin Renn (auth.), Ortwin Renn, Bernd Rohrmann (eds.), 2000
Bootstrapping Information from Corpora in a Cross-Linguistic Perspective
Massimo Moneglia and Alessandro Panunzi, 2010
Availability, Reliability and Security for Business, Enterprise and Health Information Systems: IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, ARES 2011, Vienna, Austria, August 22-26, 2011. Proceedings
Jostein Jensen (auth.), A Min Tjoa, Gerald Quirchmayr, Ilsun You, Lida Xu (eds.), 2011
Availability, Reliability, and Security in Information Systems: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings
Stephanie Teufel, Tjoa A Min, Ilsun You, Edgar Weippl (eds.), 2014
Developer's Guide to Web Application Security
Michael Cross, 2007
Developer's Guide to Web Application Security
Michael Cross, 2007
Developer's guide to web application security
Michael Cross, 2007
Developer's Guide to Web Application Security
Michael Cross, 2007
Adapting Educational and Psychological Tests for Cross-Cultural Assessment
Ronald K. Hambleton, Peter F. Merenda, Charles D. Spielberger, 2004
Hack Proofing Your Identity. In the Information Age Protect Your Family on the Internet!
Teri Bidwell, Michael Cross and Ryan Russell (Auth.), 2002
Shame and Guilt: A Key to Cross-Cultural Ministry
Hannes Wiher
Cross Site Scripting Attacks: Xss Exploits and Defense
Seth Fogie, Jeremiah Grossman, Robert Hansen, Anton Rager,, 2007
Cross Site Scripting Attacks: Xss Exploits and Defense
Seth Fogie, Jeremiah Grossman, Robert Hansen, Anton Rager,, 2007
Pesticide Formulations. Innovations and Developments
Barrington Cross and Herbert B. Scher (Eds.), 1988
(Inter)views: cross-disciplinary perspectives on rhetoric and literacy
Gary A. Olson, Irene Gale, 1991
A Black & White Garden
Kay M. Capps Cross, 2008
Cross Stitch Designs (Greenhouse Australian Crafts)
Graeme Ross, 1993