Your search returned 78 results.

Sort
Results
21.
Designing and Building Security Operations Center by
Publication details: Syngress 2014
Online resources:
Availability: No items available.

22.
Designing with the Mind in Mind (Second Edition) by
Publication details: Morgan Kaufmann 2014
Online resources:
Availability: No items available.

23.
Detecting and Combating Malicious Email by
Publication details: Syngress 2014
Online resources:
Availability: No items available.

24.
Economics-Driven Software Architecture by
Publication details: Morgan Kaufmann 2014
Online resources:
Availability: No items available.

25.
26.
Enterprise Business Intelligence and Data Warehousing by
Publication details: Morgan Kaufmann 2014
Online resources:
Availability: No items available.

27.
Eye Tracking in User Experience Design by
Publication details: Morgan Kaufmann 2014
Online resources:
Availability: No items available.

28.
Face Detection and Recognition on Mobile Devices by
Publication details: Morgan Kaufmann 2014
Online resources:
Availability: No items available.

29.
Freemium Economics by
Publication details: Morgan Kaufmann 2014
Online resources:
Availability: No items available.

30.
Guerrilla Analytics by
Publication details: Morgan Kaufmann 2014
Online resources:
Availability: No items available.

31.
Hacking and Penetration Testing with Low Power Devices by
Publication details: Syngress 2014
Online resources:
Availability: No items available.

32.
High Performance Parallelism Pearls by
Publication details: Morgan Kaufmann 2014
Online resources:
Availability: No items available.

33.
High-Performance Embedded Computing (Second Edition) by
Publication details: Morgan Kaufmann 2014
Online resources:
Availability: No items available.

34.
How to Attack and Defend Your Website by
Publication details: Syngress 2014
Online resources:
Availability: No items available.

35.
How to Define and Build an Effective Cyber Threat Intelligence Capability by
Publication details: Syngress 2014
Online resources:
Availability: No items available.

36.
Industrial Network Security (Second Edition) by
Publication details: Syngress 2014
Online resources:
Availability: No items available.

37.
Information Hiding in Speech Signals for Secure Communication by
Publication details: Syngress 2014
Online resources:
Availability: No items available.

38.
Information Management by
Publication details: Morgan Kaufmann 2014
Online resources:
Availability: No items available.

39.
Information Security Analytics by
Publication details: Syngress 2014
Online resources:
Availability: No items available.

40.
Interaction Flow Modeling Language by
Publication details: Morgan Kaufmann 2014
Online resources:
Availability: No items available.

Pages
© Designed and Maintained by Vivekananda Library, MDU Rohtak