Search alternatives:
application chapter » applications chapter, implications chapter, allocation chapter
chapter developing » change developing, water developing, changes developing
developing secure » developing leisure, developing future, developing nature
secure program » security program, lecture programs, care program
application chapter » applications chapter, implications chapter, allocation chapter
chapter developing » change developing, water developing, changes developing
developing secure » developing leisure, developing future, developing nature
secure program » security program, lecture programs, care program
1
2
by Cheruvu, Sunil.
Published 2019
Format:
Published 2019
Table of Contents: “... -- Chapter 1: Conceptualizing the Secure Internet of Things -- The BadUSB Thumb Drive -- Air-Gap Security...”
Click to View
3
by Bruce, John W., Giovarelli, Renée, Rolfes, Jr., Leonard, Bledsoe, David, Mitchell, Robert
Published 2012
Subjects:
“...APPLICABLE LAW...”Published 2012
Get full text
Get full text
4
by World Bank Group
Published 2015
Subjects:
“...AGRICULTURAL DEVELOPMENT BANK...”Published 2015
Get full text
Get full text
5
by Béné, Christophe.
Published 2023
Format:
Published 2023
Table of Contents: “...Bilateral Development Agencies -- Food Security and Food Resilience Narratives -- Regional...”
Click to View
6
7
by International Finance Corporation
Published 2015
Subjects:
“...APPLICATION PROCESS...”Published 2015
Get full text
Get full text
8
9
10
by Eskelinen, Jarmo, Garcia Robles, Ana, Lindy, Ilari, Marsh, Jesse, Muente-Kunigami, Arturo
Published 2015
Subjects:
“...mobile applications...”Published 2015
Get full text
11
12
13
14
by McGrath, Michael J.
Published 2013
Format:
Published 2013
Table of Contents: “... of Sensor-Based Applications for Healthcare -- Summary -- References -- Chapter 10: Wellness, Fitness...”
Click to View
15
by Sargsyan, Gevorg, Bhatia, Mikul, Banerjee, Sudeshna Ghosh, Raghunathan, Krishnan, Soni, Ruchi
Published 2012
Subjects:
“...ASSESSMENT PROGRAM...”Published 2012
Get full text
Get full text
16
by Nayak, Umesha.
Published 2014
Format:
Published 2014
Table of Contents: “... Program -- Chapter 2: History of Computer Security -- Introduction -- Communication -- World Wars...”
Click to View
17
18
19
by Awad, Mariette.
Published 2015
Format:
Published 2015
Table of Contents: “... -- Acknowledgments -- Chapter 1: Machine Learning -- Key Terminology -- Developing a Learning Machine -- Machine...”
Click to View
20
by Wang, Xiaochang C.
Published 2021
Format:
Published 2021
Table of Contents: “... sharing -- REFERENCES -- Chapter 4: US version of water-wise cities: Low impact development -- 4...”
Click to View


