Insider computer fraud : an in-depth framework for detecting and defending against insider IT attack
Kenneth C.Brancik2008 年出版470 页ISBN:1420046594
Next Generation Wireless Applictions Creating Mobile Applications in a Web 2.0 and Mobile 2.0 World
2008 年出版599 页ISBN:9780470725061
LECTURE NOTES IN CONTROL AND INFORMATION SCIENCES 89 AN EXPERT SYSTEMS APPROACH TO COMPUTER-AIDED
G.K.H.PANG AND A.G.J.MACFARLANE1987 年出版325 页ISBN:3540173560
Theory and applications of higher-dimensional Hadamard matrices second edition=高维哈达玛矩阵理论与应用
YiXian Yang ; Xinxin Niu ; Chengqing Xu2010 年出版490 页ISBN:7030247902
Lecture Notes in Artificial Intelligence 4696 Multi-Agent Systems and Applications V 5th Internation
CEEMAS 20072007 年出版350 页ISBN:9783540752530
SERIES IN COMPUTER SCIENCE-VOL.5 VISUALIZING ABSTRACT BOJECTS AND RELATIONS A CONSTRAINT-BASED APPRO
1989 年出版162 页ISBN:9810200099
Lecture Notes in Computer Science 4700 Formal Methods and Hybrid Real-Time Systems Essaya in Honour
2007 年出版539 页ISBN:9783540752202
Lecture Notes in Computer Science 3841 Frontiers of WWW Research and Development-APWeb 2006 8th Asia
2006 年出版1223 页ISBN:3540311424
Lecture Notes in Artificial Intelligence 3690 Multi-Agent Systems and Applications IV 4th Internatio
CEEMAS 20052005 年出版667 页ISBN:354029046X