Countering Air Terrorism
Pavel Pavlovich Hachikyan
Non-destructive Diagnostic of High Voltage Electrical Systems
Josef Vedral
Processes in Microbial Ecology
David L. Kirchman
Cognitive Bias in Intelligence Analysis
Martha Whitesmith
Frontiers in Quantum Computing
R. Anandan
Mobile Multimedia
Ismail Khalil Ibrahim
Security Fundamentals for E-commerce
Vesna Hassler & Pedrick Moore
Computer Vision and Recognition Systems Using Machine and Deep ...
Chiranji Lal Chowdhary & Mamoun Alazab & Ankit Chaudhary & Saqib Hakak & Thippa Reddy Gadekallu
Data Structures Based on Non-Linear Relations and Data Processing ...
Xingni Zhou & Zhiyuan Ren & Yanzhuo Ma & Kai Fan & Xiang Ji
Computational Intelligence in Manufacturing
Kaushik Kumar & Ganesh M. Kakandikar & J. Paulo Davim
Cyber Security Politics
Myriam Dunn Cavelty & Andreas Wenger
Smart Cities, Artificial Intelligence and Digital Transformation ...
Eylül Erva Akin & Simona Klimbacher & Giovanni Ziccardi
Applications of Artificial Intelligence in E-Healthcare Systems
Munish Sabharwal & B. Balamurugan Balusamy & S. Rakesh Kumar & N. Gayathri & Shakhzod Suvanov
Cybersecurity and Data Science Innovations for Sustainable Development ...
Thangavel Murugan & Jaisingh W
Networked Systems in Industry 4. 0 Hb
Reinhard Langmann
Critical Infrastructure Protection in Homeland Security
Theodore Gyle Lewis
Inside Cyber Warfare
Jeffrey Carr
Russian Information Warfare
Bilyana Lilly
Thangavel Murugan & Jaisingh W.
Data Science Ethics
David Martens
Data Science with Semantic Technologies
Archana Patel & Narayan C. Debnath & Bharat Bhusan
Advanced Wireless Communication and Sensor Networks
Ashish Bagwari & Geetam Singh Tomar & Jyotshana Bagwari & Jorge Luis Victória Barbosa & Musti K.S. Sastry
Encyclopedia of Computer Science
Anthony Ralston & Edwin D. Reilly & David Hemmendinger
Practical Optimization
Andreas Antoniou & Wu-Sheng Lu
Mobile Wireless Middleware
Jean-Marie Bonnin
Policing Organized Crime
Petter Gottschalk
Mass Customization for Personalized Communication Environments: ...
Mourlas, Constantinos & Germanakos, Panagiotis
Professional Visual Basic 2010 and .NET 4
Bill Sheldon & Billy Hollis & Kent Sharkey & Jonathan Marbutt & Rob Windsor & Gastón C. Hillar
Human Resources Management: Concepts, Methodologies, Tools, ...
Management Association, Information Resources
Guide to Wireless Communications
Jorge Olenewa
Principles of 3D Image Analysis and Synthesis
Bernd Girod & Günther Greiner & Heinrich Niemann
Data Science for Business
Foster Provost & Tom Fawcett
Computer Forensics
Marie-Helen Maras
Building the Infrastructure for Cloud Security
Raghuram Yeluri & Enrique Castro-Leon
E-Learning, E-Education, and Online Training
Giovanni Vincenti & Alberto Bucciero & Carlos Vaz de Carvalho
Computing, Control, Information and Education Engineering
Hsiang-Chuan Liu & Wen-Pei Sung & Wenli Yao
Foundations and Frontiers in Computer, Communication and Electrical ...
Aritra Acharyya
Handbook of Research on Human-Computer Interfaces, Developments, ...
Rodrigues, João & Cardoso, Pedro & Monteiro, Jânio & Figueiredo, Mauro
Human-Computer Interaction. User Interface Design, Development ...
Masaaki Kurosu
Collaborate Computing: Networking, Applications and Worksharing
Shangguang Wang & Ao Zhou
The Dark Web: Breakthroughs in Research and Practice
Linux Hardening in Hostile Networks
Kyle Rankin
Security and Privacy in Cyber-Physical Systems
Houbing Song & Glenn A. Fink & Sabina Jeschke
Practical Programming
Paul Gries & Jennifer Campbell & Jason Montojo
Ubiquitous Communications and Network Computing
Navin Kumar & Arpita Thakre
Advancements in Computer Vision and Image Processing
Garcia-Rodriguez, Jose
Security and Privacy in Communication Networks
Xiaodong Lin & Ali Ghorbani & Kui Ren & Sencun Zhu & Aiqing Zhang
Guide to Computer Forensics and Investigations
Bill Nelson & Amelia Phillips & Christopher Steuart
Algorithms, Methods, and Applications in Mobile Computing and ...
Borgy Waluyo, Agustinus
Linux Essentials for Cybersecurity
William Rothwell & Denise Kinsey
Weaving the Dark Web
Robert W. Gehl
5G LTE Narrowband Internet of Things (NB-IoT)
Hossam Fattah
Guide to Vulnerability Analysis for Computer Networks and Systems
Simon Parkinson & Andrew Crampton & Richard Hill
Contemporary Advances in Innovative and Applicable Information ...
Jyotsna Kumar Mandal & Devadatta Sinha & J.P. Bandopadhyay
Machine Learning and Intelligent Communications
Limin Meng & Yan Zhang
Emerging Technologies for Health and Medicine
Dac-Nhuong Le & Chung Van Le & Jolanda G. Tromp & Gia Nhu Nguyen
Introductory Computer Forensics
Xiaodong Lin
Beginning Ethical Hacking with Kali Linux
Sanjib Sinha
Intelligent Transport Systems, From Research and Development ...
Joao Carlos Ferreira & Ana Lúcia Martins & Vitor Monteiro
Natural Language Processing in Action
Hobson Lane & Cole Howard & Hannes Hapke