Search Results - Key to knowledge.
Suggested Topics within your search.
Suggested Topics within your search.
- Management 37
- Computer networks 35
- Information technology 28
- Artificial intelligence 24
- Computer science 23
- Data processing 23
- Computer security 19
- Data encryption (Computer science) 19
- Philosophy 19
- Security measures 18
- Knowledge management 17
- Education 15
- Database management 14
- Science 14
- Study and teaching 14
- Law and legislation 13
- Research 13
- Software engineering 13
- Technological innovations 13
- History 12
- Data mining 11
- Economic aspects 11
- Leadership 11
- Engineering 10
- Internet 10
- Management information systems 10
- Sustainable development 10
- Business 9
- Cryptography 8
- Cultural property 8
-
241
Information security and privacy 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings /
Published 2012“…Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange /…”
Full Text (via Springer)
Electronic Conference Proceeding eBook -
242
Agile Software Architecture : Aligning Agile Processes and Software Architectures /
Published 2014“…Architecture and Agile as Key Enablers /…”
Full Text (via ProQuest)
eBook -
243
Agile Software Architecture : Aligning Agile Processes and Software Architectures /
Published 2014“…Architecture and Agile as Key Enablers /…”
Full Text (via O'Reilly/Safari)
eBook -
244
Agile Software Architecture : Aligning Agile Processes and Software Architectures /
Published 2014“…Architecture and Agile as Key Enablers /…”
Full Text (via ScienceDirect)
eBook -
245
Agile Software Architecture : Aligning Agile Processes and Software Architectures /
Published 2014“…Architecture and Agile as Key Enablers /…”
Full Text (via Skillsoft)
Electronic eBook -
246
Female Suicide Bombings : A Critical Gender Approach /
Published 2018“…Mapping The Framework: Key Terms And Concepts --…”
Full Text (via De Gruyter)
Electronic eBook -
247
Measurement, monitoring, modelling and control of bioprocesses /
Published 2013“…Monitoring of Bioprocesses: Key Elements of the M3C Strategy /…”
Full Text (via Springer)
eBook -
248
Judgement and the epistemic foundation of logic
Published 2013“…Warranted Assertions, the Key to Science /…”
Full Text (via Springer)
Electronic eBook -
249
Handbook of strategic e-business management /
Published 2014“…Enhancing Knowledge Marketplaces Through the Theory of Knowledge …”
Full Text (via Springer)
eBook -
250
The Nuremberg Trials : international criminal law since 1945 : 60th anniversary international conference /
Published 2006Full Text (via EBSCO)
Electronic eBook -
251
Korean education in changing economic and demographic contexts
Published 2014“…Youth Key Competencies in Korea /…”
Full Text (via Springer)
Electronic eBook -
252
Technology in education : looking toward 2020 /
Published 1988“…Putting Knowledge to Use --…”
Full Text (via Taylor & Francis)
eBook -
253
Practical guide to business continuity assurance /
Published 2005“…Key Components of Operation --…”
Full Text (via ProQuest)
eBook -
254
Practical guide to business continuity assurance /
Published 2005“…Key Components of Operation --…”
Full Text (via IEEE)
eBook -
255
Practical guide to business continuity assurance /
Published 2005“…Key Components of Operation --…”
Full Text (via EBSCO)
eBook -
256
Cryptography
Published 2017“…Using the Public Key to Pass a Secret Key --…”
Full Text (via Taylor & Francis)
Electronic eBook -
257
Research for nurses : methods and interpretation /
Published 2002“…Varieties of Nursing Knowledge --…”
Full Text (via EBSCO)
eBook -
258
Advances in case-based reasoning 8th European conference, ECCBR 2006, Fethiye, Turkey, September 4-7, 2006 ; proceedings /
Published 2006“…Discovering knowledge about key sequences for indexing time series …”
Electronic Conference Proceeding eBook -
259
Interpreting across boundaries : new essays in comparative philosophy /
Published 1988“…Metaphor as Key to Understanding the Thought of Other Speech …”
Full Text (via ProQuest)
eBook -
260
Principles of security and trust second International Conference, POST 2013, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, It...
Published 2013“…Keys to the Cloud: Formal Analysis and Concrete Attacks …”
Full Text (via Springer)
Electronic Conference Proceeding eBook