Security Architect: Careers in information security
Security Architect: Careers in information security Authors: Collins, Jon Get this book Contact Email: girro@qq.com Publ...
Security Architect: Careers in information security Authors: Collins, Jon Get this book Contact Email: girro@qq.com Publ...
Resource Management in Mobile Computing Environments Authors: Mavromoustakis, Constandinos X.; Pallis, Evangelos; Mastor...
Nostradamus 2014: Prediction, Modeling and Analysis of Complex Systems Authors: Zelinka, Ivan; Suganthan, Ponnuthurai Na...
Theory and Practice of Computation: Proceedings of Workshop on Computation: Theory and Practice WCTP2013 Authors: Nishiz...
After the Book: Information Services for the 21st Century Authors: Stachokas, George Get this book Contact Email: girro@...
Smart Security: Understanding and Contributing to the Business Authors: Quilter, J. David Get this book Contact Email: g...
Data Mining For Dummies Authors: Brown, Meta S Get this book Contact Email: girro@qq.com Publisher: Wiley ( 2014-09-04 )...
Data Mining with Decision Trees: Theory and Applications Authors: Rokach, Lior; Maimon, Oded Get this book Contact Email...
Step Up & Into Windows PowerShell 4.0 Authors: Stanek, William Get this book Contact Email: girro@qq.com Publisher:...
Systems Engineering mit SysML/UML: Anforderungen, Analyse, Architektur. Mit einem Geleitwort von Richard Mark Soley Auth...