Title: Co-Engineering Applications and Adaptive Business Technologies in Practice: Enterprise Service Ontologies, Models, and Frameworks, Author: Jay Ramanathan
Title: Coarse-Graining of Condensed Phase and Biomolecular Systems / Edition 1, Author: Gregory A. Voth
Title: Code and the City / Edition 1, Author: Rob Kitchin
Title: Code Breaking in the Pacific, Author: Peter Donovan
Title: Code Design for Dependable Systems: Theory and Practical Applications / Edition 1, Author: Eiji Fujiwara
Title: Code-Based Cryptography: 7th International Workshop, CBC 2019, Darmstadt, Germany, May 18-19, 2019, Revised Selected Papers, Author: Marco Baldi
Title: Codes and Ciphers: Julius Caesar, the Enigma, and the Internet, Author: R. F. Churchhouse
Title: Codes and Ciphers: Julius Caesar, the Enigma, and the Internet / Edition 1, Author: R. F. Churchhouse
Title: Codes, Cryptology and Information Security: Second International Conference, C2SI 2017, Rabat, Morocco, April 10-12, 2017, Proceedings - In Honor of Claude Carlet, Author: Said El Hajji
Title: Codes, Cryptology and Information Security: Third International Conference, C2SI 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor of Said El Hajji, Author: Claude Carlet
Title: Codes: An Introduction to Information Communication and Cryptography / Edition 1, Author: Norman L. Biggs
Title: Codes: The Guide to Secrecy From Ancient to Modern Times / Edition 1, Author: Richard A. Mollin
Title: Coding And Cryptology - Proceedings Of The First International Workshop, Author: Huaxiong Wang
Title: Coding Approaches to Fault Tolerance in Combinational and Dynamic Systems / Edition 1, Author: Christoforos N. Hadjicostis
Title: Coding for Penetration Testers: Building Better Tools, Author: Jason Andress
Title: Coding Theory and Cryptography: The Essentials, Second Edition / Edition 2, Author: D.C. Hankerson
Title: Cognition, Education, and Communication Technology / Edition 1, Author: PETER GARDENFORS
Title: Cognitive Hack: The New Battleground in Cybersecurity ... the Human Mind / Edition 1, Author: James Bone
Title: Cold Cases: Evaluation Models with Follow-up Strategies for Investigators, Second Edition / Edition 2, Author: James M. Adcock
Title: Collaborate Computing: Networking, Applications and Worksharing: 12th International Conference, CollaborateCom 2016, Beijing, China, November 10-11, 2016, Proceedings, Author: Shangguang Wang

Pagination Links