Your search returned 5976 results.

Sort
Results
21.
Cyber Reconnaissance, Surveillance and Defense by
Publication details: Syngress 2014
Online resources:
Availability: No items available.

22.
Designing and Building Security Operations Center by
Publication details: Syngress 2014
Online resources:
Availability: No items available.

23.
Designing with the Mind in Mind (Second Edition) by
Publication details: Morgan Kaufmann 2014
Online resources:
Availability: No items available.

24.
Detecting and Combating Malicious Email by
Publication details: Syngress 2014
Online resources:
Availability: No items available.

25.
Economics-Driven Software Architecture by
Publication details: Morgan Kaufmann 2014
Online resources:
Availability: No items available.

26.
27.
Enterprise Business Intelligence and Data Warehousing by
Publication details: Morgan Kaufmann 2014
Online resources:
Availability: No items available.

28.
Eye Tracking in User Experience Design by
Publication details: Morgan Kaufmann 2014
Online resources:
Availability: No items available.

29.
Face Detection and Recognition on Mobile Devices by
Publication details: Morgan Kaufmann 2014
Online resources:
Availability: No items available.

30.
Freemium Economics by
Publication details: Morgan Kaufmann 2014
Online resources:
Availability: No items available.

31.
Guerrilla Analytics by
Publication details: Morgan Kaufmann 2014
Online resources:
Availability: No items available.

32.
Hacking and Penetration Testing with Low Power Devices by
Publication details: Syngress 2014
Online resources:
Availability: No items available.

33.
High Performance Parallelism Pearls by
Publication details: Morgan Kaufmann 2014
Online resources:
Availability: No items available.

34.
High-Performance Embedded Computing (Second Edition) by
Publication details: Morgan Kaufmann 2014
Online resources:
Availability: No items available.

35.
How to Attack and Defend Your Website by
Publication details: Syngress 2014
Online resources:
Availability: No items available.

36.
How to Define and Build an Effective Cyber Threat Intelligence Capability by
Publication details: Syngress 2014
Online resources:
Availability: No items available.

37.
Industrial Network Security (Second Edition) by
Publication details: Syngress 2014
Online resources:
Availability: No items available.

38.
Information Hiding in Speech Signals for Secure Communication by
Publication details: Syngress 2014
Online resources:
Availability: No items available.

39.
Information Management by
Publication details: Morgan Kaufmann 2014
Online resources:
Availability: No items available.

40.
Information Security Analytics by
Publication details: Syngress 2014
Online resources:
Availability: No items available.

Pages
© Designed and Maintained by Vivekananda Library, MDU Rohtak