Computing and Information Technology > Information technology: general topics

Vis mig kun

Mac OS X for Unix Geeks

Mac OS X for Unix Geeks

Rothman, Ernest E.

131,51 DKK

Network Innovation through OpenFlow and SDN

Network Innovation through OpenFlow and SDN

Hu, Fei

1167,65 DKK

Information Security Management Handbook, Volume 7

Information Security Management Handbook, Volume 7

Tiller, James S.

403,64 DKK

Computer User's Survival Guide

Computer User's Survival Guide

Stigliani, Joan

117,05 DKK

Cloud Enterprise Architecture

Cloud Enterprise Architecture

Raj, Pethuru

509,93 DKK

Official (ISC)2(R) Guide to the ISSAP(R) CBK

Official (ISC)2(R) Guide to the ISSAP(R) CBK

Corporate, (ISC)2

692,63 DKK

Integrated Information and Computing Systems for Natural, Spatial, and Social Sciences

Integrated Information and Computing Systems for Natural, Spatial, and Social Sciences

Claus-Peter

2190,77 DKK

Expert Guide to Peoplesoft Security

Expert Guide to Peoplesoft Security

Carter, Jason D.

40,46 DKK

Software Engineering Practice

Software Engineering Practice

Towhidnejad, Massood

619,55 DKK

Intrusion Detection in Wireless Ad-Hoc Networks

Intrusion Detection in Wireless Ad-Hoc Networks

Chaki, Rituparna

875,33 DKK

Industrial Applications of High-Performance Computing

Industrial Applications of High-Performance Computing

Giles, Merle

546,47 DKK

Model Based Environment

Model Based Environment

Pantic, Vladimir

40,46 DKK

Uso De La Tecnología En El Aula

Uso De La Tecnología En El Aula

Avila, Gregorio Sanchez

40,46 DKK

Security for Wireless Sensor Networks using Identity-Based Cryptography

Security for Wireless Sensor Networks using Identity-Based Cryptography

Szygenda, Stephen A.

403,64 DKK

7 Qualities of Highly Secure Software

7 Qualities of Highly Secure Software

Paul, Mano

546,47 DKK

Computational Thinking for the Modern Problem Solver

Computational Thinking for the Modern Problem Solver

Hunt, Kenny A.

802,25 DKK

Software Engineering Practice

Software Engineering Practice

Towhidnejad, Massood

619,55 DKK

TV Content Analysis

TV Content Analysis

Lian, Shiguo

1094,57 DKK

Virtual Report Processing

Virtual Report Processing

Schlueter, Louis

94,21 DKK

Open Source Data Warehousing and Business Intelligence

Open Source Data Warehousing and Business Intelligence

Bulusu, Lakshman

509,93 DKK

Security for Service Oriented Architectures

Security for Service Oriented Architectures

Williams, Walter

546,47 DKK

Mobile Social Networking and Computing

Mobile Social Networking and Computing

Ma, Jianhua

403,64 DKK

Software Maintenance Success Recipes

Software Maintenance Success Recipes

Reifer, Donald J.

729,17 DKK

Official (ISC)2 Guide to the CISSP-ISSMP CBK

Official (ISC)2 Guide to the CISSP-ISSMP CBK

Steinberg, Joseph

619,55 DKK

Iris Biometric Model for Secured Network Access

Iris Biometric Model for Secured Network Access

Khoury, Franjieh El

436,85 DKK

Data Intensive Distributed Computing: Challenges and Solutions for Large-scale Information Management

Data Intensive Distributed Computing: Challenges and Solutions for Large-scale Information Management

Tevfik

2190,77 DKK

Drupal Web Profiles

Drupal Web Profiles

Ogunjobi, Timi

296,28 DKK

Functional Start to Computing with Python

Functional Start to Computing with Python

Herman, Ted

802,25 DKK

Kansei Engineering and Soft Computing: Theory and Practice

Kansei Engineering and Soft Computing: Theory and Practice

Minghui

2190,77 DKK

Secure Data Provenance and Inference Control with Semantic Web

Secure Data Provenance and Inference Control with Semantic Web

Khadilkar, Vaibhav

509,93 DKK