161097 |
|
Bart R. |
CWTS: Certified Wireless Technology Specialist Official Study Guide: Exam PW0-070 |
2009 | •• |
16617 |
|
Imai T., Yoshie O. |
CX3CR1 |
n/a | •• |
16618 |
|
Matloubian M., Cyster J. |
CXCL16 |
n/a | •• |
16619 |
|
Roth I., Hebert C. |
CXCR1 and CXCR2 |
n/a | •• |
16620 |
|
Farber J.M., Moser B. |
CXCR3 |
n/a | •• |
16621 |
|
Moser B. |
CXCR4 |
n/a | •• |
16622 |
|
Forster R. |
CXCR5 |
n/a | •• |
18433 |
|
Cheah Ch.H., Schaefer K. |
CYA Securing IIS 6.0 |
2004 | •• |
24597 |
|
Walther H., Santry P. |
CYA: Securing Exchange Server 2003 & Outlook Web Access |
2004 | •• |
180429 |
|
Dzombak D., Ghosh R., Wong-Chong G. |
Cyanide in Water and Soil: Chemistry, Risk, and Management |
2006 | •• |
132482 |
|
Kenneth Hudnell H. |
Cyanobacterial Harmful Algal Blooms: State of the Science and Research Needs |
2008 • | •• |
140855 |
|
Hudnell H. |
Cyanobacterial Harmful Algal Blooms: State of the Science and Research Needs |
2008 | •• |
24598 |
|
Parker T., Sachs M., Shaw E. |
Cyber Adversary Characterization: Auditing the Hacker Mind |
2004 | •• |
178575 |
|
Mengin F. |
Cyber China: Reshaping National Identities in the Age of Information (Sciences Po Series in International Relations and Political Economy) |
2004 | •• |
28841 |
|
Reyes A., Brittson R., O'Shea K. |
Cyber Crime Investigations |
2007 | •• |
21067 |
|
Middleton B. |
Cyber Crime Investigator's Field Guide |
2002 • | •• |
142263 |
|
Marcella A.Jr., Greenfield R.S. |
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes |
2002 | •• |
195918 |
|
Marcella A., Menendez D. |
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes |
2007 • | •• |
180137 |
|
Howard R. |
Cyber Fraud: Tactics, Techniques and Procedures |
2009 | •• |
137060 |
|
Kenneth J. Knapp |
Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (Advances in Information Security and Privacy) |
2009 • | •• |
161563 |
|
Knapp Ê. |
Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (Advances in Information Security and Privacy) |
2009 | •• |
186973 |
|
Gaycken S., Martellini M. |
Cyber Security: Deterrence and IT Protection for Critical Infrastructures |
2013 | •• |
140711 |
|
Jajodia S., Liu P., Swarup V. |
Cyber Situational Awareness: Issues and Research |
2010 | •• |
145735 |
|
Jajodia S., Liu P., Swarup V. |
Cyber Situational Awareness: Issues and Research (Advances in Information Security) |
2010 | •• |
138330 |
|
Goodson I., Knobel M. |
Cyber Spaces Social Spaces: Culture Clash in Computerized Classrooms |
2002 | •• |
20858 |
|
Fair T., Nordfelt M., Ring S. |
Cyber Spying: Tracking Your Family's (Sometimes) Secret Online Lives |
2005 | •• |
26537 |
|
Fair T., Nordfelt M., Ring S. |
Cyber Spying: Tracking Your Family's (Sometimes) Secret Online Lives |
2005 | •• |
23860 |
|
Colarik A.M. |
Cyber Terrorism: Political and Economic Implications |
2006 | •• |
162316 |
|
Dyer-Witheford N. |
Cyber-Marx: Cycles and Circuits of Struggle in High Technology Capitalism |
1999 | •• |
134181 |
|
Cavelty M.D. |
Cyber-Security and Threat Politics: US Efforts to Secure the Information Age |
2007 | •• |
211174 |
|
Wanda Cassidy, Chantal Faucher, Margaret Jackson |
Cyberbullying at University in International Contexts |
2018 | •• |
62776 |
|
Guttmann R. |
Cybercash: The Coming Era of Electronic Money |
2003 | •• |
198657 |
|
Bell D. |
Cyberculture Theorists. Manuel Castells and Donna Haraway |
2007 • | •• |
78597 |
|
Haney W.S. |
Cyberculture, cyborgs and science fiction. consciousness and the posthuman |
2006 | •• |
21738 |
|
|
Cyberdemon 98 - The BIBLE |
2000 | •• |
181788 |
|
Bayuk J. |
CyberForensics: Understanding Information Security Investigations (Springers Forensic Laboratory Science Series) |
2010 | •• |
141484 |
|
Ehlers J.F. |
Cybernetic Analysis for Stocks and Futures: Cutting-Edge DSP Technology to Improve Your Trading |
2004 | •• |
178282 |
|
Ehlers J. |
Cybernetic Analysis for Stocks and Futures: Cutting-Edge DSP Technology to Improve Your Trading (Wiley Trading) |
2004 | •• |
16221 |
|
Ruggiero M. |
Cybernetic Trading Strategies |
1997 | •• |
133060 |
|
Murray A. Ruggiero |
Cybernetic Trading Strategies: Developing a Profitable Trading System with State-of-the-Art Technologies |
1997 • | •• |
192151 |
|
Danet B. |
Cyberpl@y: Communicating Online (New Technologies New Cultures Series) |
2001 | •• |
165926 |
|
Hafner K., Markoff J. |
Cyberpunk: Outlaws and Hackers on the Computer Frontier |
1991 | •• |
165217 |
|
Loader B. |
Cyberspace Divide: Equality, Agency and Policy in the Information Society |
1998 | •• |
163309 |
|
Nemnich M., Jandt F. |
Cyberspace Job Search Kit 2001-2002: The Complete Guide to Online Job Seeking and Career Information (Cyberspace Job Search Kit) |
2001 | •• |
83313 |
|
Kowalik J.S., Gorski J., Sachenko A. |
Cyberspace security and defense: research issues. Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense, NATO Advanced Research Workshop |
2005 • | •• |
176979 |
|
Kowalik J ., Gorski J., Sachenko A. |
Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues, ... II: Mathematics, Physics and Chemistry) |
2005 | •• |
210888 |
|
Antonio Spadaro |
Cybertheology |
2014 | •• |
132020 |
|
et al Garvalho F.D. |
Cyberwar-netwar: Security in the Information Age |
2006 | •• |
35489 |
|
Kalpazidou S.L.L. |
Cycle Representations of Markov Processes |
2006 • | •• |
148245 |
|
Fels G., Huckleberry A., Wolf J. |
Cycle Spaces of Flag Domains. A Complex Geometric Viewpoint |
2006 | •• |