Free Delivery Over $100
33699 books were found.
This handbook is organized under three major parts. The first part of this handbook deals with multimedia security... Read More >>
This is then followed with a description of the implementation of the concepts in a sample kernel, complete with... Read More >>
The three volume set provides a systematic overview of theories and technique on social network analysis.Volume... Read More >>
Read More >>
autonomous control of unmanned aircraft systems.Part III: marine bio-inspired robotics and soft robotics: materials,... Read More >>
This two-volume set LNCS 11662 and 11663 constitutes the refereed proceedings of the 16th International Conference... Read More >>
The three-volume set, LNCS 11692, LNCS 11693, and LNCS 11694, constitutes the refereed proceedings of the 39th Annual... Read More >>
This book constitutes the refereed proceedings of the 10th International Conference of the CLEF Association, CLEF... Read More >>
This book constitutes the proceedings of the Second International Conference on Information and Communication Technology... Read More >>
This book constitutes the refereed proceedings of the 16th International Conference on Trust, Privacy and Security... Read More >>
This book constitutes the refereed proceedings of the 9th International Conference on Industrial Applications of... Read More >>
Password Log Book 5x8 in 120 pages. Password Keeper, Vault, Notebook and Online Organizer. This password journal... Read More >>
I'll remember that password you think. Or you write it down on a scrap of paper. But let's face it, you will forget... Read More >>
Note: Interior tabs are printed black on the edge of each pagePrivate notebook for keeping track of all your Passwords... Read More >>
Jilan Liu, as Primary Consultant of JCI and HIMSS Vice President & Chief Executive, Greater China presents a selection... Read More >>
Want to Remember the Passwords! This is the perfect book to keep all your password information together and secure.... Read More >>