熱門搜尋
分類(單選) |
顯示所有篩選
|
---|---|
配送方式(可複選) | |
其他(可複選) |
搜尋結果共 110 筆, 頁數 1 / 2
呈現:
Introduction to Cryptography
Cryptography is a key technology in electronic key systems. It is used to keep data secret, digitall... more |
|||
Poems to Share
These poems are written in the hope that they will inspire you to move closer to the Lord Jesus Chri... more |
|||
The Meticulous Unveiling: A Visit to a Mind
|
|||
I Can’’t Reach It!
|
|||
I Can’’t Reach It!
|
|||
Quinn Saves Christmas
|
|||
Quinn Saves Christmas
|
|||
Who Wants To Play With Little Mouse?
Little learners love to count forwards and backwards with Little Mouse! On a sunny day, behind the t... more |
|||
Mollie’’s Magical Tooth
|
|||
Mollie’’s Magical Tooth
|
|||
Malbuch für Kinder: Malbuch für Kinder / (Super Malbücher für Kinder)
|
|||
Geflügelte Worte
|
|||
Geflügelte Worte
|
|||
The Practice of Enterprise Modeling: 11th Ifip Wg 8.1. Working Conference, Poem 2018, Vienna, Austria, October 31– November 2, 2
This volume constitutes the proceedings of the 11th IFIP WG 8.1 Conference on the Practice of Enterp... more |
|||
To Make A Difference
|
|||
Natives of Lost Places
|
|||
Informatics in Economy: 15th International Conference, IE 2016, Cluj-Napoca, Romania, June 2-3, 2016 Revised Selected Papers
|
|||
Privately and Publicly Verifiable Computing Techniques: A Survey
This book presents the first comprehensive overview of various verifiable computing techniques, whic... more |
|||
Bee Basics: An Introduction to Our Native Bees
|
|||
Introduction to Public Key Infrastructures
The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast... more |
|||
Snooze. Pin. Done. Getting Things Done With Inbox by Gmail: Tips and Insights from Two Members of Google’s Top Contributor Progr
A detailed examination into Google s latest groundbreaking entry into email management, Inbox by Gma... more |
|||
Homomorphic Signature Schemes: A Survey
|
|||
The Reason for Flowers: Their History, Culture, Biology, and How They Change Our Lives
"Fascinating...Buchmann’s knowledge and enthusiasm jump off the page." --The Wall Street Journal "An extraordinarily...... more |
|||
The Evolution of Innovation Networks: An Automotive Case Study
|
|||
Valuing the Innovation Potentials of Firms: What Theory Suggests, Practitioners Do, and Both Implies for Existing Theory
Jan Buchmann focuses on the valuation of a firm’s innovation potential based on that firm’s position in its lifecycle...... more |
|||
Knowledge Science, Engineering and Management: 7th International Conference, Ksem 2014, Sibiu, Romania, October 16-18, 2014. Pro
|
|||
Introduction to Public Key Infrastructures
The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast... more |
|||
Hélio Oiticica and Neville D’Almeida: Block-Experiments in Cosmococa -- program in progress
An illustrated study that casts a new light on Oiticica s most important work of quasi-cinema on i... more |
|||
Public Key Cryptography - PKC 2012: 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt,
This book constitutes the refereed proceedings of the 15th International Conference on Practice and ... more |
|||
The Bee Tree
Special Recognition, Paterson Prize for Books for Young People Skipping Stones Honor Award, Skipping... more |
|||
Binary Quadratic Forms: An Algorithmic Approach
The book deals with algorithmic problems related to binary quadratic forms. Written by a world leade... more |
|||
Principles and Applications of Distributed Event-Based Systems
Showcases event-based systems in real-world applications. This book provides professionals, research... more |
|||
Wireless Sensor Network Technologies for the Information Explosion Era
Wireless Sensor Network Technologies for Information Explosion Era The amount and value of informati... more |
|||
Post-Quantum Cryptography
Quantum computers will break today’s most popular public-key cryptographic systems, including RSA, D... more |
|||
Post-Quantum Cryptography: Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA October 17-19, 2008 Proceedings
This book constitutes the refereed proceedings of the Second International Workshop on Post-Quantum ... more |
|||
Binary Quadratics Forms: An Algorithmic Approach
The book deals with algorithmic problems related to binary quadratic forms. Written by a world leade... more |
|||
Art After Conceptual Art
Well-known art historians from Europe and the Americas discuss the influence of conceptualism on art... more |
|||
Object-oriented Technology. ECOOP 2003 Workshop Reader: ECOOP 2003 Workshops, Darmstadt, Germany, July 21-25, 2003, Final Report
snapshot of current object-oriented technology will prove stimulating to you. October 2003 Frank Buschmann Alejandro Buchmann...... more |
|||
Out of the Garden: Women Writers on the Bible
Essays of considerable literary erudition and sophistication that... dislodge dull stereotypes to en... more |
|||
You Got to Be Original, Man: The Music of Lester Young
Young’s recorded legacy in this exhaustive discography. This companion volume to Buchmann-Moller’s You Just Fight for Your...... more |
|||
You Just Fight for Your Life: The Story of Lester Young
. Historian Frank Buchmann-Moller crafts a full length biography exclusively for Lester Young fans focusing on Young’s philosophy...... more |
|||
Knowledge Science, Engineering and Management: 16th International Conference, Ksem 2023, Guangzhou, China, August 16-18, 2023, Proceedings, Part IV
This volume set constitutes the refereed proceedings of the 16th International Conference on Knowled... more |
|||
Knowledge Science, Engineering and Management: 16th International Conference, Ksem 2023, Guangzhou, China, August 16-18, 2023, Proceedings, Part III
This volume set constitutes the refereed proceedings of the 16th International Conference on Knowled... more |
|||
Knowledge Science, Engineering and Management: 16th International Conference, Ksem 2023, Guangzhou, China, August 16-18, 2023, Proceedings, Part II
This volume set constitutes the refereed proceedings of the 16th International Conference on Knowled... more |
|||
Knowledge Science, Engineering and Management: 16th International Conference, Ksem 2023, Guangzhou, China, August 16-18, 2023, Proceedings, Part I
This volume set constitutes the refereed proceedings of the 16th International Conference on Knowled... more |
|||
Advances in Information Systems Development: AI for Is Development and Operations
This volume is a collection of papers on emerging concepts, significant insights, and novel approach... more |
|||
Post-Quantum Cryptography
Quantum computers will break today’s most popular public-key cryptographic systems, including RSA, D... more |
|||
Perspectives in Business Informatics Research: 20th International Conference on Business Informatics Research, BIR 2021, Vienna, Austria, September 22
This book constitutes the proceedings of the 20th International Conference on Perspectives in Busine... more |
|||
Perspectives in Business Informatics Research: 19th International Conference on Business Informatics Research, Bir 2020, Vienna, Austria, September 21
This book constitutes the proceedings of the 19th International Conference on Perspectives in Busine... more |
|||
A Celebration of the EDGE Program’’s Impact on the Mathematics Community and Beyond
The Enhancing Diversity in Graduate Education (EDGE) Program began twenty years ago to provide suppo... more |
|||
The Routledge Companion to Media and Tourism
The Routledge Companion to Media and Tourism provides a comprehensive overview of the research into ... more |
|||
A Celebration of the Edge Program’s Impact on the Mathematics Community and Beyond
The Enhancing Diversity in Graduate Education (EDGE) Program began twenty years ago to provide suppo... more |
|||
Progress in Cryptology - Africacrypt 2019: 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019, Proceedings
This book constitutes the refereed proceedings of the 11th International Conference on the Theory an... more |
|||
Wireless Sensor Network Technologies for the Information Explosion Era
Wireless Sensor Network Technologies for Information Explosion Era The amount and value of informati... more |
|||
Investigation of Anorectal Functional Disorders: With Special Emphasis on Defaecography
|
|||
On Object-Oriented Database Systems
Object-oriented database systems have been approached with mainly two major intentions in mind, name... more |
|||
Technologies for E-Services: Third International Workshop, Tes 2002, Hong Kong, China, August 23-24, 2002, Proceedings
|
|||
Design and Implementation of Large Spatial Databases: First Symposium Ssd ’’89. Santa Barbara, California, July 17/18, 1989. Proceedings
These proceedings of SSD ’89 include subjects such as extensible database systems, spatial data stru... more |
|||
What a Bee Knows: Exploring the Thoughts, Memories, and Personalities of Bees
remarkable abilities to navigate, learn, communicate, and remember. In What a Bee Knows, entomologist Stephen Buchmann explores a...... more |
|||
European Climate Diplomacy in the USA and China: Embassy Narratives and Coalitions
Buchmann analyses the work of UK, German, Danish and Swedish embassies in the USA and China on climate change in the...... more |