Title: Telecom For Dummies, Author: Stephen P. Olejniczak
Title: Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering, Author: Hamid R. Nemati
Title: Estimation with Applications to Tracking and Navigation: Theory Algorithms and Software / Edition 1, Author: Yaakov Bar-Shalom
Title: Digital Communications with Emphasis on Data Modems: Theory, Analysis, Design, Simulation, Testing, and Applications / Edition 1, Author: Richard W. Middlestead
Title: E-Coaching: Theory and practice for a new online approach to coaching / Edition 1, Author: Anne Ribbers
Title: Applied Cryptography: Protocols, Algorithms, and Source Code in C / Edition 2, Author: Bruce Schneier
Title: Radical Technologies: The Design of Everyday Life, Author: Adam Greenfield
Title: Homeland Security Technology Challenges: From Sensing and Encrypting to Mining and Modeling, Author: Giorgio Franceschetti
Title: Performance Analysis of Telecommunications and Local Area Networks, Author: Wah Chun Chan
Title: Performance Evaluation of Computer and Communication Systems: Joint Tutorial Papers of Performance '93 and Sigmetrics '93 / Edition 1, Author: Lorenzo Donatiello
Title: Information and Communications Security: 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings / Edition 1, Author: Petra Perner
Title: Streaming, Sharing, Stealing: Big Data and the Future of Entertainment, Author: Michael D. Smith
Title: Information and Communications Security: 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings / Edition 1, Author: Javier Lïpez
Title: Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption, Author: Santo Banerjee
Title: Forensics in Telecommunications, Information and Multimedia: Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers / Edition 1, Author: Matthew Sorell
Title: IP Communications and Services for NGN / Edition 1, Author: Johnson I Agbinya
Title: World Without Secrets: Business, Crime, and Privacy in the Age of Ubiquitous Computing / Edition 1, Author: Richard S. Hunter
Title: Robust Communications Software: Extreme Availability, Reliability and Scalability for Carrier-Grade Systems / Edition 1, Author: Greg Utas
Title: Synchronization of Digital Telecommunications Networks / Edition 1, Author: Stefano Bregni
Title: Embedded Cryptographic Hardware: Methodologies and Architectures, Author: Nadia Nedjah

Pagination Links