132986 |
|
Allen J.R. |
Sedimentary Structures. Their Character and Physical Basis |
1982 | •• |
133334 |
|
Allen J.R. |
Sedimentary structures. Their character and physical basis |
1982 | •• |
51264 |
|
Tucker M.E. |
Sedimentary Rocks in the Field |
2003 • | •• |
84192 |
|
Friend P.F., Nichols G., Williams E. |
Sedimentary processes, environments, and basins. A tribute to Peter Friend |
2007 | •• |
162109 |
|
Gyr A., Hoyer K. |
Sediment transport a geophysical phenomenon |
2006 • | •• |
41103 |
|
Jones S.J. (Ed) |
Sediment Flux to Basins: Causes, Controls and Consequences |
2002 | •• |
40948 |
|
Kusuda T. (Ed), Yamanishi H. |
Sediment and Ecohydraulics: INTERCOH 2005, Vol. 9 |
2007 | •• |
24303 |
|
Robbins A. |
sed & awk Pocket Reference |
2002 • | •• |
183767 |
|
Schaumont P., Aysu A., Gierlichs B. |
Security, Privacy, and Applied Cryptography Engineering: Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings |
2013 | •• |
30085 |
|
Petkovic M. (Ed), Jonker W. (Ed) |
Security, Privacy and Trust in Modern Data Management |
2007 | •• |
76726 |
|
Dulaney E., Pastore M. |
Security+, Study Guide |
2004 • | •• |
26956 |
|
Crayton C.A., Dubrawsky I., Cross M. |
Security+ Study Guide and DVD Training System |
2007 • | •• |
29592 |
|
Dubrawsky I., Faircloth J. |
Security+ Study Guide |
2007 • | •• |
75667 |
|
Crayton C.A., Dubrawsky I., Cross M. |
Security+ Study Guide |
2003 | •• |
19528 |
|
Hausman K., Barrett D., Weiss M. |
Security+ Exam Cram 2 (Exam SYO-101) |
2003 | •• |
26098 |
|
Microsoft Corporation, Hudson K., Ruth A. |
Security+ Certification Training Kit |
2003 | •• |
22627 |
|
Peikari C., Chuvakin A. |
Security Warrior |
2004 | •• |
149032 |
|
Fang W., Khan M., Arnett K. |
Security Technology, Disaster Recovery and Business Continuity |
2010 | •• |
175636 |
|
Coon J. |
Security Technology in U.S. Public Schools (Criminal Justice) |
2007 | •• |
155802 |
|
Dominik Slezak, Tai-Hoon Kim, Wai-chi Fang |
Security Technology (Communications in Computer and Information Science, 58) |
2010 • | •• |
24500 |
|
Oppliger R. |
Security Technologies for the World Wide Web |
2003 | •• |
24831 |
|
Andres S., Kenyon B. |
Security Sage's Guide to Hardening the Network Infrastructure |
2004 | •• |
132100 |
|
Lomas M. |
Security Protocols: International Workshop Cambridge, United Kingdom April 10-12, 1996 Proceedings |
1997 | •• |
78944 |
|
Christianson B., Crispo B. |
Security Protocols: 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers |
2005 | •• |
80452 |
|
Bruce Christianson B.(ed.), Bruno Crispo B.(ed.), Malcolm J.A.(ed.) |
Security Protocols 7th International Workshop Cambridge, UK, April 19-21, 1999 Proceedings |
2000 • | •• |
80551 |
|
Christianson B.(ed.), Crispo B.(ed.), Malcom J.A.(ed.) |
Security Protocols 13th International Workshop Cambridge, UK, April 20-22, 2005 Revised Selected Papers |
2007 | •• |
80549 |
|
Christianson B.(ed.), Crispo B.(ed.), Malcolm J.A.(ed.) |
Security Protocols 10th International Workshop Cambridge, UK, April 17-19, 2002 Revised Papers |
2004 • | •• |
158310 |
|
Christianson B., Crispo B., Malcolm J. |
Security Protocols |
2010 | •• |
134352 |
|
Rannenberg K. (ed.), Varadharajan V. (ed.), Weber C. (ed.) |
Security Privacy - Silver Linings in the Cloud |
2010 | •• |
30073 |
|
Bryan B., Killion D., Lynn M. |
Security Power Tools |
2007 | •• |
27476 |
|
Maiwald E., Sieglein W. |
Security Planning and Disaster Recovery |
2002 | •• |
24302 |
|
Schumacher M., Fernandez-Buglioni E., Hybertson D. |
Security Patterns Integrating Security and Systems Engineering |
2006 | •• |
127041 |
|
Poweski B., Raphael D. |
Security on Rails (The Pragmatic Programmers) |
2009 | •• |
189392 |
|
Poweski B., Raphael D. |
Security on Rails |
2009 | •• |
153316 |
|
Cabrera E., Vela A. |
Security of Water Supply Systems |
2006 | •• |
165297 |
|
Hetland J., Gochitashvili T. |
Security of Natural Gas Supply through Transit Countries (NATO Science Series II: Mathematics, Physics and Chemistry) |
2004 | •• |
195994 |
|
M. Obaidat, N.Boudriga |
Security of e-Systems and Computer Networks |
2007 | •• |
80683 |
|
Halleen G., Kellogg G. |
Security Monitoring with Cisco Security MARS |
2007 | •• |
166434 |
|
Tsai J., Ma L. |
Security Modeling and Analysis of Mobile Agent Systems (Electrical and Computer Engineering) |
2006 | •• |
133783 |
|
Tsai J., Ma L. |
Security Modeling And Analysis of Mobile Agent Systems |
2006 | •• |
139590 |
|
Tsai J., Ma L. |
Security Modeling And Analysis of Mobile Agent Systems |
2006 | •• |
29606 |
|
Jaquith A. |
Security Metrics: Replacing Fear, Uncertainty, and Doubt (Symantec Press Series) |
2007 | •• |
58695 |
|
Jaquith A. |
Security Metrics: Replacing Fear, Uncertainty, and Doubt |
2007 | •• |
136026 |
|
Gerald L. Kovacich, Edward Halibozek |
Security Metrics Management: How to Manage the Costs of an Assets Protection Program |
2005 • | •• |
139364 |
|
Kovacich G., Halibozek E. |
Security Metrics Management: How to Manage the Costs of an Assets Protection Program |
2006 | •• |
56788 |
|
Duffie D. |
Security Markets. Stochastic Models |
1988 | •• |
24830 |
|
Babbin J., Carter E.F. |
Security Log Management: Identifying Patterns in the Chaos |
2006 | •• |
29394 |
|
Butler C., Fuller E., Rogers J.A. |
Security Interviews Exposed: Secrets to Landing Your Next Information Security Job |
2007 | •• |
31415 |
|
Butler Ch., Rogers R., Hurley Ch. |
Security Interviews Exposed: Secrets to Landing Your Next Information Security Job |
2007 | •• |
140775 |
|
Miller D., Harris S., Harper A. |
Security Information and Event Management Implementation |
2010 | •• |