Collections

 First Page   Previous   281   282   283   284   285   Next   Last Page 
Smart tv security: media playback and digital video broadcast

Smart tv security: media playback and digital video broadcast

Availability : 1 copies available for loan
Algorithms + data structures = programs

Algorithms + data structures = programs

Availability : 1 copies available for loan
Algorithms for worst-case design and applications to risk management

Algorithms for worst-case design and applications to risk management

Availability : 1 copies available for loan
Building an enterprise architecture practice: tools, tips, best practices, ready-to-use insights

Building an enterprise architecture practice: tools, tips, best practices, ready-to-use insights

Availability : 1 copies available for loan
Service transition based on ITIL v3: a management guide

Service transition based on ITIL v3: a management guide

Availability : 1 copies available for loan
Fuzzing for software security testing and quality assurance

Fuzzing for software security testing and quality assurance

Availability : 1 copies available for loan

IT security risk management in the context of cloud computing

Availability : 1 copies available for loan
 First Page   Previous   281   282   283   284   285   Next   Last Page