Search alternatives:
technology security » technology series, technology electricity
a technology » _ technology, new technology, media technology
2
Published 2020
...Advanced sciences and technologies for security applications (Springer)...
Book
3
by Mougayar, William,
Published 2016
Subjects: ...Internet Technological innovations....
Get full text
eBook
4
5
Published 2015
Subjects: ...Information technology Political aspects....
Get full text
eBook
7
by Ransome, James.
Published 2014
Subjects: ...Computer security....
Get full text
eBook
8
Published 2013
Table of Contents: ... and security in Northeast Asia : geographical interfaces -- Drinking poison to quench a thirst? : the security...
Get full text
eBook
9
Published 2013
Table of Contents: ... press releases / Rachel Finn and Michael McCahill -- The virtual surveillance lab : the creation of a...
Get full text
eBook
10
Published 2013
Table of Contents: ... of Identities, Political Confrontation, and Production Technologies / Volodymyr Kulyk -- #Holodomor : Twitter...
Get full text
eBook
11
Published 2013
Subjects: ...Educational technology Security measures....
Get full text
eBook
12
by Khoury, Franjieh El.
Published 2013
Subjects: ...Computer networks Security measures....
Get full text
eBook
13
Published 2013
Table of Contents: ..., and Battlestar Galactica -- Religion in sort of a global sense: the relevance of religious practices...
Get full text
eBook
14
Published 2012
...Chapman & Hall/CRC cryptography and network security....
Get full text
eBook
15
by Howard, Patrick D.
Published 2012
Subjects: ...Computer networks Security measures Examinations Study guides....
Get full text
eBook
16
Published 2012
Table of Contents: ...Part I. Homeland security and organization and administration: a first look at homeland security...
Get full text
Electronic
18
Published 2012
Table of Contents: ..., and change of the field of application / BEATRICE MÜLLER -- A social and environmental assessment of pre...
Get full text
eBook
19
Published 2012
Table of Contents: ..., retrieval, and management -- pt. 4. Methodology, techniques, and applications : multimedia security -- pt. 5...
Get full text
eBook
20
by Speed, Tyler Justin.
Published 2012
Subjects: ...Information technology Security measures....
Get full text
Electronic