Title: The Hack Is Back: Techniques to Beat Hackers at Their Own Games, Author: Jesse Varsalone
Title: Integrated Assurance: Unified Risk Strategy, Author: Patrick Hayes
Title: Introduction to Artificial Intelligence and Machine Learning, with eBook Access Code, Author: R. Kelly Rainer
Title: The Esri Guide to GIS Analysis, Volume 3: Modeling Suitability, Movement, and Interaction, Author: Andy Mitchell
Title: Securing Systems: Applied Security Architecture and Threat Models, Author: Brook S. E. Schoenfield
Title: The Total CISSP Exam Prep Book: Practice Questions, Answers, and Test Taking Tips and Techniques, Author: Thomas R. Peltier
Title: Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication, Author: Alyson Wilson
Title: Information Economics, Author: Urs Birchler
Title: Enabling Enterprise Transformation: Business and Grassroots Innovation for the Knowledge Economy, Author: Nagy K. Hanna
Title: Informatics: 10 Years Back. 10 Years Ahead, Author: Reinhard Wilhelm
Title: The New Economy and Economic Growth in Europe and the US, Author: David B. Audretsch
Title: Competitive Information in Small Businesses, Author: T. Chesney
Title: Managing A Network Vulnerability Assessment, Author: Thomas R. Peltier
Title: Emerging Communication Technologies Based on Wireless Sensor Networks: Current Research and Future Applications, Author: Mubashir Husain Rehmani
Title: Applying Artificial Intelligence in Project Management, Author: Paul Boudreau
Title: Introduction to Certificateless Cryptography, Author: Hu Xiong
Title: Guided Inquiry: Learning in the 21st Century, Author: Carol C. Kuhlthau
Title: Web Information Systems Engineering - WISE 2015: 16th International Conference, Miami, FL, USA, November 1-3, 2015, Proceedings, Part I, Author: Jianyong Wang
Title: Theory, Design, and Applications of Unmanned Aerial Vehicles, Author: A. R. Jha
Title: Cybercrime Investigations: A Comprehensive Resource for Everyone, Author: John Bandler

Pagination Links