熱門搜尋

    您輸入的關鍵字: Ahmadreza

    分類(單選)
    配送方式(可複選)
    其他(可複選)
    ~

    搜尋結果共 28 筆, 頁數 1 / 1

    Determination of the mutated fraction of NPM1 in AML by dPCR

    Determination of the mutated fraction of NPM1 in AML by dPCR

    • 優惠價: 3740

    Mutation of the NPM1 (Nucleophosmin) gene is one of the most frequently observed acquired mutations ... more

    Introduction to Layout Design and Automation of Photonic Integrated Circuits

    Introduction to Layout Design and Automation of Photonic Integrated Circuits

    • 優惠價: 3299
    How to Get Hired

    How to Get Hired

    • 優惠價: 266

    Ahmadreza Nakhjavani, who graduated with a Doctorate of Business Administration from the Lyon3 University of France, is...... more

    Advances in Discrete-Time Sliding Mode Control: Theory and Applications

    Advances in Discrete-Time Sliding Mode Control: Theory and Applications

    • 優惠價: 3597

    The focus of this book is on the design of a specific control strategy using digital computers. This... more

    Thermal Comfort in Hot Dry Climates: Traditional Dwellings in Iran

    Thermal Comfort in Hot Dry Climates: Traditional Dwellings in Iran

    • 優惠價: 3417

    With increases in global temperatures, the risk of overheating is expected to rise around the world.... more

    Advances in Discrete-Time Sliding Mode Control: Theory and Applications

    Advances in Discrete-Time Sliding Mode Control: Theory and Applications

    • 優惠價: 8250
    The Continuing Arms Race: Code-Reuse Attacks and Defenses

    The Continuing Arms Race: Code-Reuse Attacks and Defenses

    • 優惠價: 5997

    As human activities moved to the digital domain, so did all the well-known malicious behaviors inclu... more

    Thermal Comfort in Hot Dry Climates: Traditional Dwellings in Iran

    Thermal Comfort in Hot Dry Climates: Traditional Dwellings in Iran

    • 優惠價: 7150
    Applied Cryptography and Network Security: 14th International Conference, Proceedings

    Applied Cryptography and Network Security: 14th International Conference, Proceedings

    • 優惠價: 3299

    This book constitutes the refereed proceedings of the 14th International Conference on Applied Crypt... more

    Building Secure Defenses Against Code-reuse Attacks

    Building Secure Defenses Against Code-reuse Attacks

    • 優惠價: 3299

    This book provides an in-depth look at return-oriented programming attacks. It explores several conv... more

    Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions

    Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions

    • 優惠價: 1799

    Today, embedded systems are used in many security-critical applications, from access control, electr... more

    Radio Frequency Identification: Security and Privacy Issues: 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23,

    Radio Frequency Identification: Security and Privacy Issues: 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23,

    • 優惠價: 3299

    This book constitutes the refereed post-proceedings of the 10th Workshop on RFID Security and Privac... more

    Implementing Reading Comprehension Programs

    Implementing Reading Comprehension Programs

    • 優惠價: 3261
    Financial Cryptography and Data Security: 17th International Conference, Fc 2013, Okinawa, Japan, April 1-5, 2013, Revised Selec

    Financial Cryptography and Data Security: 17th International Conference, Fc 2013, Okinawa, Japan, April 1-5, 2013, Revised Selec

    • 優惠價: 3299

    This book constitutes the thoroughly refereed post-conference proceedings of the 17th International ... more

    The vernacular Iranian architecture

    The vernacular Iranian architecture

    • 優惠價: 3505
    Towards Hardware-Intrinsic Security: Foundations and Practice

    Towards Hardware-Intrinsic Security: Foundations and Practice

    • 優惠價: 10199
    Trust and Trustworthy Computing: Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010, Proceedings

    Trust and Trustworthy Computing: Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010, Proceedings

    • 優惠價: 3299

    This volume contains the proceedings of the Third International Conference on Trust and Trustworthy ... more

    Information Hiding: 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers

    Information Hiding: 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers

    • 優惠價: 3299

    This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Wo... more

    Research in Cryptology: Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers

    Research in Cryptology: Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers

    • 優惠價: 3299

    This book constitutes the refereed proceedings of the Second Western European Workshop on Research i... more

    The Continuing Arms Race: Code-Reuse Attacks and Defenses

    The Continuing Arms Race: Code-Reuse Attacks and Defenses

    • 優惠價: 4797
    Towards Hardware-Intrinsic Security: Foundations and Practice

    Towards Hardware-Intrinsic Security: Foundations and Practice

    • 優惠價: 10199
    Cryptology and Network Security: 11th International Conference, Cans 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings

    Cryptology and Network Security: 11th International Conference, Cans 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings

    • 優惠價: 3299
    Introduction to Layout Design and Automation of Photonic Integrated Circuits

    Introduction to Layout Design and Automation of Photonic Integrated Circuits

    • 優惠價: 3299
    Pen in Hand

    Pen in Hand

    • 優惠價: 1330

    This book is a practical example of modern journalism in Persian and includes last 176 days of autho... more

    When I Colored in the World

    When I Colored in the World

    • 優惠價: 646

    With a box of colored crayons and an eraser to rub things out, one child sets out to transform the w... more

    Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions

    Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions

    • 優惠價: 2100

    Today, embedded systems are used in many security-critical applications, from access control, electr... more

    Trust and Trustworthy Computing: 4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011, Proceedings

    Trust and Trustworthy Computing: 4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011, Proceedings

    • 優惠價: 3299
    Trusted Computing-Challenges and Applications: First International Conference on Trusted Computing and Trust in Information Tech

    Trusted Computing-Challenges and Applications: First International Conference on Trusted Computing and Trust in Information Tech

    • 優惠價: 2278

    搜尋推薦

    您可能感興趣的活動

    • 兌點瘋 OPEN POINT點數買最划算!