Digital Forensics Services & Training
Cyber Crime.Ppt 1
Digital Forensics Certification Board (DFCB) Meeting
International Capital Mobility and the Impact of International Migration: Lessons from Historical Experience
Cultural and ethical issues in international distance education
Cyber Crime In Sri Lanka
Optimal Fiscal Policy in a Small Open Economy and the Structure of International Financial Markets
#1 black friday and cyber monday deals melissa doug beginner pattern blocks
London Accountancy Firm SRLV Hosts Premier International Associates Conference
Intake and Nutrient Utilization of West African Dwarf Goats Fed Mango (Mangifera indica), Ficus (Ficus thionningii), Gliricidia (Gliricidia sepium) Foliages and Concentrates as Supplements to Basal Diet of Guinea Grass (Panicum maximum)
Use coupon below to get discount at eCampus.com!
$3 off textbook orders over $75
$4 off textbook orders over $90
$5 off textbook orders over $100
Copy the coupon code before clicking the button!
|Amazon US||Paperback||$58.32 - $72.00|
This volume constitutes the refereed proceedings of the First International ICST Conference on Mobile Networks and Management, held in Athens, Greece, during October 2009.The 8 revised full papers ...
Autonomic Computing and Communications Systems: Third International Icst Conference, Autonomics 2009, Limassol, Cyprus, September 9-11, 2009, Revised Selected P
Interested readers will find here the thoroughly refereed post-proceedings of the International Workshop of Sequences, Subsequences and Consequences, SSC 2007, held in Los Angeles, USA, in 2007. The ...
Stabilization, Safety, and Security of Distributed Systems: 12th International Symposium, Sss 2010, New York, Ny, USA, September 20-22, 2010, Proceedings
Principles and Practice of Constraint Programming-CP 2002: 8th International Conference, CP 2002, Ithaca, Ny, Usa, September 9-13, 2002 : Proceedings
Discrete Geometry for Computer Imagery: 15th Iapr International Conference, Dgci 2009, Montreal, Canada, September 30 - October 2, 2009, Proceedings
Graph Transformations: 5th International Conference, Icgt 2010, Twente, the Netherlands, September 27--october 2, 2010, Proceedings
This book constitutes the thoroughly refereed post-conference proceedings of the First International Conference on Information Security and Digital Forensics, ISDF 2009, which was held in ...
This book contains the proceedings of the Second European Conference on Computer Network Defence that took place in December 2006 at the Faculty of Advanced Technology, University of Glamorgan, in ...
This book constitutes the thoroughly refereed post-conference proceedings of the First International Conference on Electronic Healthcare for the 21st century, eHealth 2008, held in London, UK, in ...