| 24597 |
|
Walther H., Santry P. |
CYA: Securing Exchange Server 2003 & Outlook Web Access |
2004 | •• |
| 180429 |
|
Dzombak D., Ghosh R., Wong-Chong G. |
Cyanide in Water and Soil: Chemistry, Risk, and Management |
2006 | •• |
| 132482 |
|
Kenneth Hudnell H. |
Cyanobacterial Harmful Algal Blooms: State of the Science and Research Needs |
2008 • | •• |
| 140855 |
|
Hudnell H. |
Cyanobacterial Harmful Algal Blooms: State of the Science and Research Needs |
2008 | •• |
| 24598 |
|
Parker T., Sachs M., Shaw E. |
Cyber Adversary Characterization: Auditing the Hacker Mind |
2004 | •• |
| 178575 |
|
Mengin F. |
Cyber China: Reshaping National Identities in the Age of Information (Sciences Po Series in International Relations and Political Economy) |
2004 | •• |
| 28841 |
|
Reyes A., Brittson R., O'Shea K. |
Cyber Crime Investigations |
2007 | •• |
| 21067 |
|
Middleton B. |
Cyber Crime Investigator's Field Guide |
2002 • | •• |
| 142263 |
|
Marcella A.Jr., Greenfield R.S. |
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes |
2002 | •• |
| 195918 |
|
Marcella A., Menendez D. |
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes |
2007 • | •• |
| 180137 |
|
Howard R. |
Cyber Fraud: Tactics, Techniques and Procedures |
2009 | •• |
| 137060 |
|
Kenneth J. Knapp |
Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (Advances in Information Security and Privacy) |
2009 • | •• |
| 161563 |
|
Knapp Ê. |
Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (Advances in Information Security and Privacy) |
2009 | •• |
| 186973 |
|
Gaycken S., Martellini M. |
Cyber Security: Deterrence and IT Protection for Critical Infrastructures |
2013 | •• |
| 140711 |
|
Jajodia S., Liu P., Swarup V. |
Cyber Situational Awareness: Issues and Research |
2010 | •• |
| 145735 |
|
Jajodia S., Liu P., Swarup V. |
Cyber Situational Awareness: Issues and Research (Advances in Information Security) |
2010 | •• |
| 138330 |
|
Goodson I., Knobel M. |
Cyber Spaces Social Spaces: Culture Clash in Computerized Classrooms |
2002 | •• |
| 20858 |
|
Fair T., Nordfelt M., Ring S. |
Cyber Spying: Tracking Your Family's (Sometimes) Secret Online Lives |
2005 | •• |
| 26537 |
|
Fair T., Nordfelt M., Ring S. |
Cyber Spying: Tracking Your Family's (Sometimes) Secret Online Lives |
2005 | •• |
| 23860 |
|
Colarik A.M. |
Cyber Terrorism: Political and Economic Implications |
2006 | •• |
| 162316 |
|
Dyer-Witheford N. |
Cyber-Marx: Cycles and Circuits of Struggle in High Technology Capitalism |
1999 | •• |
| 134181 |
|
Cavelty M.D. |
Cyber-Security and Threat Politics: US Efforts to Secure the Information Age |
2007 | •• |
| 211174 |
|
Wanda Cassidy, Chantal Faucher, Margaret Jackson |
Cyberbullying at University in International Contexts |
2018 | •• |
| 62776 |
|
Guttmann R. |
Cybercash: The Coming Era of Electronic Money |
2003 | •• |
| 198657 |
|
Bell D. |
Cyberculture Theorists. Manuel Castells and Donna Haraway |
2007 • | •• |
| 78597 |
|
Haney W.S. |
Cyberculture, cyborgs and science fiction. consciousness and the posthuman |
2006 | •• |
| 21738 |
|
|
Cyberdemon 98 - The BIBLE |
2000 | •• |
| 181788 |
|
Bayuk J. |
CyberForensics: Understanding Information Security Investigations (Springers Forensic Laboratory Science Series) |
2010 | •• |
| 141484 |
|
Ehlers J.F. |
Cybernetic Analysis for Stocks and Futures: Cutting-Edge DSP Technology to Improve Your Trading |
2004 | •• |
| 178282 |
|
Ehlers J. |
Cybernetic Analysis for Stocks and Futures: Cutting-Edge DSP Technology to Improve Your Trading (Wiley Trading) |
2004 | •• |
| 16221 |
|
Ruggiero M. |
Cybernetic Trading Strategies |
1997 | •• |
| 133060 |
|
Murray A. Ruggiero |
Cybernetic Trading Strategies: Developing a Profitable Trading System with State-of-the-Art Technologies |
1997 • | •• |
| 192151 |
|
Danet B. |
Cyberpl@y: Communicating Online (New Technologies New Cultures Series) |
2001 | •• |
| 165926 |
|
Hafner K., Markoff J. |
Cyberpunk: Outlaws and Hackers on the Computer Frontier |
1991 | •• |
| 165217 |
|
Loader B. |
Cyberspace Divide: Equality, Agency and Policy in the Information Society |
1998 | •• |
| 163309 |
|
Nemnich M., Jandt F. |
Cyberspace Job Search Kit 2001-2002: The Complete Guide to Online Job Seeking and Career Information (Cyberspace Job Search Kit) |
2001 | •• |
| 83313 |
|
Kowalik J.S., Gorski J., Sachenko A. |
Cyberspace security and defense: research issues. Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense, NATO Advanced Research Workshop |
2005 • | •• |
| 176979 |
|
Kowalik J ., Gorski J., Sachenko A. |
Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues, ... II: Mathematics, Physics and Chemistry) |
2005 | •• |
| 210888 |
|
Antonio Spadaro |
Cybertheology |
2014 | •• |
| 132020 |
|
et al Garvalho F.D. |
Cyberwar-netwar: Security in the Information Age |
2006 | •• |
| 35489 |
|
Kalpazidou S.L.L. |
Cycle Representations of Markov Processes |
2006 • | •• |
| 148245 |
|
Fels G., Huckleberry A., Wolf J. |
Cycle Spaces of Flag Domains. A Complex Geometric Viewpoint |
2006 | •• |
| 163863 |
|
Alspach B., Godsil C. |
Cycles in Graphs |
1985 | •• |
| 59458 |
|
Alspach B.R. (ed.), Godsil C.D. (ed.) |
Cycles in Graphs (Mathematics Studies) |
1985 | •• |
| 193642 |
|
Oyama S., Griffiths P., Gray R. |
Cycles of Contingency: Developmental Systems and Evolution |
2001 | •• |
| 52864 |
|
Dewey E.R., Mandino O. |
Cycles: The Mysterious Forces That Trigger Events |
1971 | •• |
| 52863 |
|
Dewey E.R., Dakin E.F. |
Cycles: The Science of Prediction |
1947 | •• |
| 51637 |
|
Minkin V.I., Minyaev R.M. |
Cyclic Aromatic Systems with Hypervalent Centers |
2001 | •• |
| 83353 |
|
Eicher T |
Cyclic compounds (Topics in current chemistry, volume 57) |
1975 | •• |
| 134577 |
|
Christian Rohde |
Cyclic Coverings, Calabi-Yau Manifolds and Complex Multiplication |
2010 • | •• |