Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
securing development » housing development, sector development, tourism development
development program » development programs, development programme, development process
machine securing » machine seeing, machine scheduling, machinery security
securing development » housing development, sector development, tourism development
development program » development programs, development programme, development process
machine securing » machine seeing, machine scheduling, machinery security
1
2
by Biele, Cezary.
Published 2023
Format:
Published 2023
Table of Contents: “...Intro -- Foreword -- Contents -- Machine Intelligence -- Light Fixtures Position Detection Using a...”
Click to View
3
by Awad, Mariette.
Published 2015
Format:
Published 2015
Table of Contents: “... -- Acknowledgments -- Chapter 1: Machine Learning -- Key Terminology -- Developing a Learning Machine -- Machine...”
Click to View
4
by Cheruvu, Sunil.
Published 2019
Format:
Published 2019
Table of Contents: “... -- Lightweight Machine 2 Machine (LWM2M) -- LWM2M Architecture -- LWM2M Device Management -- LWM2M Security...”
Click to View
5
by World Bank
Published 2012
Subjects:
“...AUTOMATED TELLER MACHINES...”Published 2012
Get full text
Get full text
6
by International Finance Corporation
Published 2015
Subjects:
“...AUTOMATED TELLER MACHINES...”Published 2015
Get full text
Get full text
7
by World Bank
Published 2013
Subjects:
“...AUTOMATED TELLER MACHINES...”Published 2013
Get full text
Get full text
8
by Nayak, Umesha.
Published 2014
Format:
Published 2014
Table of Contents: “... Program -- Chapter 2: History of Computer Security -- Introduction -- Communication -- World Wars...”
Click to View
9
10
by Zimmer, Vincent.
Published 2015
Format:
Published 2015
Table of Contents: “... -- Programming Guides -- The Intel® Firmware Support Package -- The Uniqueness of Embedded Firmware -- The Choice...”
Click to View
11
12
13
by Lysne, Olav.
Published 2018
Format:
Published 2018
Table of Contents: “... in Vendors Is Different from Computer Security -- 1.7 Why the Problem Is Important -- 1.8 Advice for Readers...”
Click to View
14
by Goericke, Stephan.
Published 2019
Format:
Published 2019
Table of Contents: “... Behaviours -- 3.3 TSP Is a Learning and Development Scheme -- 3.4 The Skills Inventory -- 3.5 Program Member...”
Click to View
15
by Reussner, Ralf.
Published 2019
Format:
Published 2019
Table of Contents: “....3 Integrating Model-Based Security Constraints with Program Code -- 9.3.1 Codeling: Integrating Architecture...”
Click to View
16
by Youssef, Ali.
Published 2014
Format:
Published 2014
Table of Contents: “... -- Wi-Fi Alliance -- Core Programs -- Optional Programs -- International Organization...”
Click to View
17
by Kohl, Holger.
Published 2023
Format:
Published 2023
Table of Contents: “... Machining -- 1 Introductions -- 1.1 State of the Art -- 1.2 Definition of Goals -- 2 The Developed Position...”
Click to View
18
by Schüppstuhl, Thorsten.
Published 2021
Format:
Published 2021
Table of Contents: “... by Immersive Man-Machine Interaction -- 1 Introduction -- 2 Current Developments in Man-Machine Interaction...”
Click to View
19
by McGrath, Michael J.
Published 2013
Format:
Published 2013
Table of Contents: “... Healthcare -- Public Health -- Technology Nexus -- National Security -- The Internet of Things -- Water...”
Click to View
20
by Krajci, Iggy.
Published 2013
Format:
Published 2013
Table of Contents: “... -- Ruggedization -- Ingress Protection Rating -- Medical -- Virtualized -- Secure Communications -- Type 1...”
Click to View


