Fun and Games: Second International Conference, Eindhoven, The Netherlands, October 20-21, 2008, Proceedings (Lecture Notes in Computer Science)
by Panos Markopoulos, Wijnand IJsselsteijn, Duncan Rowland
Proskauer on Privacy: A Guide to Privacy and Data Security Law in the Information Age (Corporate and Securities Law Library)
by Kristen J. Mathews
Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (Secperu 2006) (IEEE Conference Proceedings)
by Institute of Electrical and Electronics Engineers
Microsoft Visual Basic Interview Questions: Microsoft VB Certification Review
by Terry Sanchez-Clark
Automotive Embedded Systeme: Effizfientes Framework - Vom Design zur Implementierung (Xpert.press) (German Edition)
by Joachim Wietzke, Manh Tien Tran
Broadband Communications: Networks, Services, Applications, Future Directions: 1996 International Zurich Seminar on Digital Communications IZS'96, ... (Lecture Notes in Computer Science)
by Bernhard Plattner
2616: Information Protection and Network Security: 24-26 October 1995, Philadelphia, Pennsylvania (Proceedings of Spie--The International Society of Optical Engineering, V. 2616.)
by Viktor E. Hampel, Clifford Neuman, John Perry Barlow