Showing 1,141 - 1,160 results of 1,221 for search 'Attica~', query time: 1.59s Refine Results
  1. 1141
    by Man Young Rhee
    Published
    Subjects: ... efficient, secure CDMA cellular networks. CDMA is an attra...
    TEXT
  2. 1142
    by Thomas H. Bivins
    Published
    Subjects: ..., newsletter and magazine articles, brochures, print advertisi...
    TEXT
  3. 1143
    by Jazib Frahim
    Published
    Subjects: ...Identify, mitigate, and respond to network attacks * Understand the evolution of security...
    TEXT
  4. 1144
    Subjects: ... 180 articles from over 200 leading experts,...
    TEXT
  5. 1145
    by Getting Started
    Published
    Subjects: ... 180 articles from over 200 leading experts, p...
    TEXT
  6. 1146
    Subjects: ... 180 articles from over 200 leading experts, p...
    TEXT
  7. 1147
    by Simon Haykin
    Published
    Subjects: ... within East and South Europe, Australia, South Africa...
    TEXT
  8. 1148
    by Raymond R. Panko
    Published
    Subjects: .../IP Internetworking. 4. Attack Methods. 5. Firewalls. 6. Host Security. 7. The Elements...
    TEXT
  9. 1149
    by Brian Buege
    Published
    Subjects: ... attacks, countermeasures and specific case studies. Since...
    TEXT
  10. 1150
    by Randy layman
    Published
    Subjects: ... attacks, countermeasures and specific case studies. Since...
    TEXT
  11. 1151
    by Art taylor
    Published
    Subjects: ... attacks, countermeasures and specific case studies. Since...
    TEXT
  12. 1152
    by ---- Leman
    Published
    Subjects: ...Inventory merupakan salah satu aktiva lancar perusahaan yang diharapkan akan menghasilkan laba...
    TEXT
  13. 1153
    by Scott Mueller
    Published
    Subjects: ... Mueller has taught thousands in his weeklong seminars and millions through his books, videos, and articles...
    TEXT
  14. 1154
    by Muhammad Imansyah
    Published
    Subjects: ...----Gunakan password yang kuat dan rubah secara regular -Waspadai attachment Email dan download...
    TEXT
  15. 1155
    by Mike Schiffman
    Published
    Subjects: ..., fully understand, and adequately explain attacks that have taken place on other peoples networks...
    TEXT
  16. 1156
    by Slamet Sugiri
    Published
    Subjects: ... pengendalian intern. Bagian II (bab 2 s/d bab 8) membahas aktiva dan utang lancar. Bagian III (bab 9 s/d 10...
    TEXT
  17. 1157
    by Gary McGraw
    Published
    Subjects: ... defender must be able to think like an attacker. I s Greg Hoglund Pearson Education,Inc. 9780132271912...
    TEXT
  18. 1158
    Published 1976
    TEXT
  19. 1159
  20. 1160
    by WERLIN S. NAINGGOLAN.
    Published 1978
    TEXT