熱門搜尋

    您輸入的關鍵字: Susilo

    分類(單選)
    配送方式(可複選)
    其他(可複選)
    ~

    搜尋結果共 27 筆, 頁數 1 / 1

    Marketing Agility: Insight Into Trust and Perceived Risk and How They Affect Investment Intentions

    Marketing Agility: Insight Into Trust and Perceived Risk and How They Affect Investment Intentions

    • 優惠價: 1881

    The existence of ports in Indonesia has a very strategic and vital role in supporting inter-island c... more

    Nyepi: The Day of Silence

    Nyepi: The Day of Silence

    • 優惠價: 589

    A richly illustrated book inspired by Bali’s New Year’s tradition of "Nyepi," a day of silence. Ayu ... more

    Marketing: The Theories Contribution and Pursuit the Best - Achievement in Business

    Marketing: The Theories Contribution and Pursuit the Best - Achievement in Business

    • 優惠價: 4373
    The Psychology of Effective Activism

    The Psychology of Effective Activism

    • 優惠價: 1320
    The Business Research

    The Business Research

    • 優惠價: 5875
    Advances in Cyber Security: Principles, Techniques, and Applications

    Advances in Cyber Security: Principles, Techniques, and Applications

    • 優惠價: 10799

    This book provides state-of-the-art coverage of the principles, techniques, and management of issues... more

    Introduction to Security Reduction

    Introduction to Security Reduction

    • 優惠價: 10799

    This monograph illustrates important notions in security reductions and essential techniques in secu... more

    Introduction to Security Reduction

    Introduction to Security Reduction

    • 優惠價: 10799

    This monograph illustrates important notions in security reductions and essential techniques in secu... more

    Information Security and Privacy: 19th Australasian Conference, Acisp 2014, Wollongong, Nsw, Australia, July 7-9, 2014. Proceedi

    Information Security and Privacy: 19th Australasian Conference, Acisp 2014, Wollongong, Nsw, Australia, July 7-9, 2014. Proceedi

    • 優惠價: 3299
    Military Engagement: Influencing Armed Forces Worldwide to Support Democratic Transition: Overview and Action Plan

    Military Engagement: Influencing Armed Forces Worldwide to Support Democratic Transition: Overview and Action Plan

    • 優惠價: 1620

    " The response of an autocratic nation’s armed forces is crucial to the outcome of democratization m... more

    Association of Filamentous Phage with "Ralstonia Solanacearum"

    Association of Filamentous Phage with "Ralstonia Solanacearum"

    • 優惠價: 2911
    Information and Communication Security: 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, Proceed

    Information and Communication Security: 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, Proceed

    • 優惠價: 3299

    This book constitutes the refereed proceedings of the 13th International Conference on Information a... more

    Information Security Practice and Experience: 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proc

    Information Security Practice and Experience: 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proc

    • 優惠價: 3299

    The4thInformationSecurityPracticeandExperienceConference(ISPEC2008) was held at Crowne Plaza, Darlin... more

    Information Security: 25th International Conference, Isc 2022, Bali, Indonesia, December 18-22, 2022, Proceedings

    Information Security: 25th International Conference, Isc 2022, Bali, Indonesia, December 18-22, 2022, Proceedings

    • 優惠價: 5399

    This book constitutes the proceedings of the 25th International Conference on Information Security, ... more

    Cyberspace Safety and Security: 14th International Symposium, CSS 2022, Xi’an, China, October 16-18, 2022, Proceedings

    Cyberspace Safety and Security: 14th International Symposium, CSS 2022, Xi’an, China, October 16-18, 2022, Proceedings

    • 優惠價: 3299

    This book LNCS 13547 constitutes the proceedings of the 14th International Symposium on Cyberspace S... more

    Cyber Security Meets Machine Learning

    Cyber Security Meets Machine Learning

    • 優惠價: 6599

    Chapter 1. IoT Attacks and Malware.- Chapter 2. Machine Learning-based Online Source Identification ... more

    Cyber Security Meets Machine Learning

    Cyber Security Meets Machine Learning

    • 優惠價: 9599

    Chapter 1. IoT Attacks and Malware.- Chapter 2. Machine Learning-based Online Source Identification ... more

    Information Security: 23rd International Conference, Isc 2020, Bali, Indonesia, December 16-20, 2020, Proceedings

    Information Security: 23rd International Conference, Isc 2020, Bali, Indonesia, December 16-20, 2020, Proceedings

    • 優惠價: 3299

    This book constitutes the proceedings of the 23rd International Conference on Information Security, ... more

    Provable Security: 12th International Conference, Provsec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings

    Provable Security: 12th International Conference, Provsec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings

    • 優惠價: 3299

    This book constitutes the refereed proceedings of the 12th International Conference on Provable Secu... more

    Information Security and Privacy: 23rd Australasian Conference, Acisp 2018, Wollongong, Nsw, Australia, July 11-13, 2018, Proceedings

    Information Security and Privacy: 23rd Australasian Conference, Acisp 2018, Wollongong, Nsw, Australia, July 11-13, 2018, Proceedings

    • 優惠價: 6599
    Provable Security: 7th International Conference, Provsec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings

    Provable Security: 7th International Conference, Provsec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings

    • 優惠價: 3299
    Information Security and Privacy: 17th Australasian Conference, Acisp 2012, Wollongong, Nsw, Australia, July 9-11, 2012. Proceedings

    Information Security and Privacy: 17th Australasian Conference, Acisp 2012, Wollongong, Nsw, Australia, July 9-11, 2012. Proceedings

    • 優惠價: 3299
    Information Security and Privacy: 13th Australasian Conference, Acisp 2008, Wollongong, Australia, July 7-9, 2008, Proceedings

    Information Security and Privacy: 13th Australasian Conference, Acisp 2008, Wollongong, Australia, July 7-9, 2008, Proceedings

    • 優惠價: 3299
    Provable Security

    Provable Security

    • 優惠價: 3299
    Bridging the Communication Gap in Healthcare: Challenges and Opportunities in Hierarchical and Collectivistic Cultures

    Bridging the Communication Gap in Healthcare: Challenges and Opportunities in Hierarchical and Collectivistic Cultures

    • 優惠價: 9599
    數字簽名密史:從急需到有趣

    數字簽名密史:從急需到有趣

    • 優惠價: 87 折, 355
    Internet of Things and Machine Learning for Type I and Type II Diabetes: Use Cases

    Internet of Things and Machine Learning for Type I and Type II Diabetes: Use Cases

    • 優惠價: 9900

    Internet of Things and Machine Learning for?Type I and Type II Diabetes: Use Cases provides a medium... more

    搜尋推薦

    您可能感興趣的活動

    • 博客來【每字美句】收藏、紀錄、分享你最愛的一句