alt text

alt text


Contact Us

alt text

Our Location

alt text

How Can We Help?


Showing 10 Results, Digital:73, Print: 0

Showing Page No. 1 , Digital:73, Print: 0

(Lecture Notes in Computer Science 5820 Information Systems and Applications, incl. Internet Web, and HCI) John Anderson (auth.), Jiming Liu, Jinglong Wu, Yiyu Yao, Toyoaki Nishida (eds.)

By Active M
101., ()

Subject:
Availability: 1 of 1(eBook)
Read More

(Lecture Notes in Computer Science 6335 Information Systems and Applications, incl. Internet Web, and HCI) Ben Shneiderman (auth.), Aijun An, Pawan Lingras, Sheila Petty, Runhe Huang (eds.)

By Active
101., ()

Subject:
Availability: 1 of 1(eBook)
Read More

(Oxford Psychology Series 37) John M. Findlay, Iain D. Gilchrist

By Active Vision The Psychology of Looking
101., ()

Subject:
Availability: 1 of 1(eBook)
Read More

0071638024 Interactive and Direct Market

By Unknown
2009., ()

Subject:
Availability: 1 of 1(eBook)
Read More

A general zero-knowledge scheme

By Burmester, M. V. D., Desmedt, Y., Piper, F.
101., ()

Subject: Advances in Cryptology - EuroCrypt '89; Lecture Notes in Computer Science Volume 434; interactive proofs; Fiat-Shamir protocol; security; zero knowledge
Availability: 1 of 1(eBook)
Read More

Active Private Equity Real Estate Strategy

By Lynn, David J.
2009., ()

Subject:
Availability: 1 of 1(eBook)
Read More

Ad-Hoc Networking: IFIP 19th World Computer Congress, TC-6, IFIP Interactive Conference on Ad-Hoc Networking, August 20-25, 2006, Santiago, Chile (IFIP ... in Information and Communication Technology)

By Khaldoun Al Agha
2006., ()

Subject: ISBN-13:; 9780387346359
Availability: 1 of 1(eBook)
Read More

Anonymous NIZK proofs of knowledge with preprocessing

By D'Amiano, S.
101., ()

Subject: Advances in Cryptology - EuroCrypt '95; Lecture Notes in Computer Science Volume 921; zero knowledge; non-interactive proofs
Availability: 1 of 1(eBook)
Read More

Attracting the Best: How the Military Competes for Information Technology Personnel

By James R. Hosek, Michael G. Mattock, C. Christine Fair, Jennifer Kavanagh, Jennifer Sharp, Mark Totten
101., ()

Subject: This report focuses on the factors affecting the supply of information technology (IT) personnel to the active duty enlisted force; and the findings point to the conclusion that the IT training opport
Availability: 1 of 1(eBook)
Read More

Authentication procedures

By Davio, M., Goethals, J. M.
101., ()

Subject: Cryptography - Proceedings of the Workshop on Cryptography; Burg Feuerstein; Germany; Lecture Notes in Computer Science Volume 149; codes; interactive authentication ; identification schemes; password
Availability: 1 of 1(eBook)
Read More

<< Prev Next >>
                                                              
Most Viewed View All