Connectionist-Symbolic Integration : From Unified to Hybrid Approaches
Ron Sun
Download - Immediately Available
Format: eBook (PDF)
Connectionist-Symbolic Integration : From Unified to Hybrid Approaches
Ron Sun
Download - Immediately Available
Format: eBook (EPUB)
Internet and Electronic Commerce Law in the European Union
Mr John Dickie
Download - Immediately Available
Format: eBook (PDF)
International Domain Name Law : Icann and the Udrp
David Lindsay
Download - Immediately Available
Format: eBook (PDF)
Enterprise Level Security 1 & 2
Kevin Foltz
Out of stock
Format: Book (Multiple-component retail product)
Managing Risk and Security in Outsourcing IT Services : Onshore, Offshore and the Cloud
Frank Siepmann
Download - Immediately Available
Format: eBook (EPUB)
Touchless Fingerprint Biometrics
Ruggero Donida Labati
Download - Immediately Available
Format: eBook (PDF)
Anti-Spam Techniques Based on Artificial Immune System
Ying (Peking University, China) Tan
Download - Immediately Available
Format: eBook (PDF)
The Cognitive Early Warning Predictive System Using the Smart Vaccine : The New Digital Immunity Paradigm for Smart Cities and Critical Infrastructure
Rocky Termanini
Download - Immediately Available
Format: eBook (PDF)
Technocrime and Criminological Theory
Kevin (Kansas State University, Manhattan, USA) Steinmetz
Download - Immediately Available
Format: eBook (PDF)
Healthcare Fraud Investigation Guidebook
Charles E. Piper
Download - Immediately Available
Format: eBook (PDF)
PCI Compliance : The Definitive Guide
Abhay Bhargav
Download - Immediately Available
Format: eBook (EPUB)
Software Test Attacks to Break Mobile and Embedded Devices
Jon Duncan Hagar
Download - Immediately Available
Format: eBook (EPUB)
Ethics and the Internal Auditor's Political Dilemma : Tools and Techniques to Evaluate a Company's Ethical Culture
Lynn (Consulting, Business Advisory and Training, Overland P Fountain
Download - Immediately Available
Format: eBook (PDF)
Network and Data Security for Non-Engineers
Frank M. (Ball State University, Muncie, Indiana, USA) Groom
Download - Immediately Available
Format: eBook (PDF)
Illegal Online File Sharing, Decision-Analysis, and the Pricing of Digital Goods
Michael I. C. Nwogugu
Download - Immediately Available
Format: eBook (PDF)
Physical Security and Safety : A Field Guide for the Practitioner
Truett A. (Eastern Kentucky University, Richmond, USA (retired) Ricks
Download - Immediately Available
Format: eBook (PDF)
Circuits and Systems for Security and Privacy
Farhana (Portland, Oregon, USA) Sheikh
Download - Immediately Available
Format: eBook (PDF)
Cybervetting : Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition
Edward J. (iNameCheck LLC, Bethany Beach, Delaware, USA) Appel
Download - Immediately Available
Format: eBook (PDF)
Policies & Procedures for Data Security: A Complete Manual for Computer Systems and Networks
Thomas Peltier
Download - Immediately Available
Format: eBook (PDF)
Data Communications Network Auditing
Bruce Griffis
Download - Immediately Available
Format: eBook (PDF)
Privacy-Aware Knowledge Discovery : Novel Applications and New Techniques
Francesco Bonchi
Download - Immediately Available
Format: eBook (PDF)
Get Certified : A Guide to Wireless Communication Engineering Technologies
Syed A. Ahson
Download - Immediately Available
Format: eBook (PDF)
Vein Pattern Recognition : A Privacy-Enhancing Biometric
Chuck (ii2P, Southlake, Texas, USA) Wilson
Download - Immediately Available
Format: eBook (PDF)