Home Advanced Search

Advanced Search - Page 1

Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns
  • PDF
  • English
  • Year: 2014
  • Author: Clive Blackwell, Hong Zhu (eds.)
Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns
  • PDF
  • English
  • Year: 2014
  • Author: Blackwell, Clive;Zhu, Hong
Insider Threat : Combatting the Enemy Within
  • PDF
  • English
  • Year: 2009
  • Author: Clive Blackwell
Running a Safe and Successful Acupuncture Clinic
  • PDF
  • English
  • Author: Hong Zhen Zhu, Dr TCM, RAc (Canada) MD (China) (Eds.)
Signal Processing and Networking for Big Data Applications
  • PDF
  • English
  • Year: 2017
  • Author: Mingyi Hong and Zhu Han
Theory and Applications of Models of Computation: 4th International Conference, TAMC 2007, Shanghai, China, May 22-25, 2007. Proceedings
  • PDF
  • English
  • Year: 2007
  • Author: Reid Andersen, Fan Chung (auth.), Jin-Yi Cai, S. Barry Cooper, Hong Zhu (eds.)
Design and Analysis of Pragmatic Trials
  • PDF
  • English
  • Year: 2023
  • Author: Song Zhang, Chul Ahn, Hong Zhu
Intelligent Robotics and Applications: Third International Conference, ICIRA 2010, Shanghai, China, November 10-12, 2010. Proceedings, Part I
  • PDF
  • English
  • Year: 2010
  • Author: Zhaopeng Chen, Neal Y. Lii, Minghe Jin, Shaowei Fan, Hong Liu (auth.), Honghai Liu, Han Ding, Zhenhua Xiong, Xiangyang Zhu (eds.)