Collections

 First Page   Previous   6   7   8   9   10   Next   Last Page 
Network security : know it all

Network security : know it all

Availability : 1 copies available for loan
Computer vision metrics

Computer vision metrics

Availability : 1 copies available for loan
FISMA compliance handbook : 2nd edition

FISMA compliance handbook : 2nd edition

Availability : 1 copies available for loan
Grounded innovation : strategies for inventing smart products

Grounded innovation : strategies for inventing smart products

Availability : 1 copies available for loan
Introduction to cybercrime : computer crimes, laws, and policing in the 21st century

Introduction to cybercrime : computer crimes, laws, and policing in the 21st century

Availability : 1 copies available for loan
Computer architecture a quantitative approach 5ed

Computer architecture a quantitative approach 5ed

Availability : 1 copies available for loan
CSA guide to cloud computing implementing cloud privacy and security

CSA guide to cloud computing implementing cloud privacy and security

Availability : 1 copies available for loan
Principles of data mining

Principles of data mining

Availability : 1 copies available for loan
Deep learning in vision-based static hand gesture recognition

Deep learning in vision-based static hand gesture recognition

Availability : 1 copies available for loan
 First Page   Previous   6   7   8   9   10   Next   Last Page