نتایج جستجو

Advanced Multimedia and Ubiquitous Engineering: Future Information Technology
James J. (Jong Hyuk) Park, Han-Chieh Chao, Hamid Arabnia, Neil Y. Yen (eds.), 2015
Advanced Multimedia and Ubiquitous Engineering: Future Information Technology Volume 2
James J. (Jong Hyuk) Park, Han-Chieh Chao, Hamid Arabnia, Neil Y. Yen (eds.), 2016
Defensive Information Warfare
David S. Alberts, 1996
Information Age Transformation: Getting Into a 21st Century Military (series)
David S. Alberts, 2002
Expert Fuzzy Information Processing
Olga Poleshchuk, Evgeniy Komarov (auth.), 2011
Dairy production on pasture : an introduction to grass based and seasonal dairying
Lee Rinehart; Appropriate Technology Transfer for Rural Areas (Organization); ATTRANational Sustainable Agriculture Information Service.; National Center for Appropriate Technology, 2009
Advances in Cryptology - ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings
Duong Hieu Phan, David Pointcheval (auth.), Chi-Sung Laih (eds.), 2003
Advances in Cryptology - ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings
Martin Hirt, Ueli Maurer, Vassilis Zikas (auth.), Josef Pieprzyk (eds.), 2008
Advances in Cryptology - ASIACRYPT’99: International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November 14-18, 1999. Proceedings
Kenji Koyama, Yukio Tsuruoka, Noboru Kunihiro (auth.), Kwok-Yan Lam, Eiji Okamoto, Chaoping Xing (eds.), 1999
Advances in Cryptology – ASIACRYPT 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings
Christophe De Cannière, Christian Rechberger (auth.), Xuejia Lai, Kefei Chen (eds.), 2006
Advances in Cryptology – ASIACRYPT 2007: 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings
Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen K. Lenstra, Dag Arne Osvik (auth.), Kaoru Kurosawa (eds.), 2007
Advances in Cryptology – ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings
Alex Biryukov, Dmitry Khovratovich (auth.), Mitsuru Matsui (eds.), 2009
Information Technology for Management: Improving Strategic and Operational Performance
Efraim Turban, Linda Volonino, 2011
Advances in Computational Science and Engineering: Second International Conference, FGCN 2008, Workshops and Symposia, Sanya, Hainan Island, China, December 13-15, 2008 in Computer and Information Science)
Tai-Hoon Kim, Laurence Tianruo Yang, Jong Hyuk Park, Alan Chin-Chen Chang, Thanos Vasilakos, Yan Zhang, Damien Sauveron, Xingang Wang, Young-Sik Jeong, 2009
Advances in Information Systems Development
Gabor Knapp, Gabor Knapp, Gregory Wojtkowski, Joze Zupancic, Stanislaw Wrycza, 2007
Business rules and information systems: aligning IT with business goals
Tony Morgan, 2002
CISA Certified Information Systems Auditor Study Guide
David L. Cannon, Timothy S. Bergmann, Brady Pamplin, 2008
CISA Certified Information Systems Auditor Study Guide
David L. Cannon, 2008