Türler
4G & Beyond (Eletronics and Telecommunications Research)
Computed Synchronization for Multimedia Applications (The Springer International Series in Engineering and Computer Science)
CISSP Examination Review Guide
Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft
Unix and C: A Tutorial Introduction
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
Data Mining: A Knowledge Discovery Approach