Hacking and Penetration Testing with Low Power Devices
Hacking and Penetration Testing with Low Power Devices by: Polstra, Philip Publisher: Elsevier Science ( 2014-09-02 ) IS...
Hacking and Penetration Testing with Low Power Devices by: Polstra, Philip Publisher: Elsevier Science ( 2014-09-02 ) IS...
Modeling and Simulation:The Computer Science of Illusion by: Raczynski, Stanislaw Publisher: Wiley ( 2014-09-02 ) ISBN-1...
Working with Facebook by: Studio Visual Steps Publisher: Visual Steps Publishing ( 2014-09-01 ) e-ISBN-13: 9789059054110...
Hard Problems in Software Testing:Solutions Using Testing as a Service (TaaS) by: Tilley, Scott; Floss, Brianna Publishe...
How to Cheat in 3ds Max 2015:Get Spectacular Results Fast by: McCarthy, Michael Publisher: Taylor and Francis ( 2014-09-...
Approximability of Optimization Problems through Adiabatic Quantum Computation by: Cruz-Santos, William; Morales-Luna, G...
Developing and Managing Embedded Systems and Products:Methods, Techniques, Tools, Processes, and Teamwork by: Fowler, Ki...
Compute-IT:Student's Book 2 - Computing for KS3 by: Dorling, Mark; Rouse, George Publisher: Hodder Education ( 2014-08-2...
Informatik und Gesellschaft:Eine sozio-technische Perspektive by: Kienle, Andrea; Kunau, Gabriele Publisher: De Gruyter ...
The Computer After Me:Awareness and Self-Awareness in Autonomic Systems by: Pitt, Jeremy Publisher: World Scientific Pub...