Informacijos architektūra (anglų k.)

iš viso 123
Rodoma 91-120123


Agile Processes in Software Engineering and Extreme Programming
Agile Processes in Software Engineering and Ext...
  • Išparduota

Formal Methods: Foundations and Applications
Formal Methods: Foundations and Applications
  • Išparduota

Formal Aspects of Security and Trust
Formal Aspects of Security and Trust
  • Išparduota

Modelling Autonomic Communication Environments
Modelling Autonomic Communication Environments
  • Išparduota

Financial Cryptography and Data Security
Financial Cryptography and Data Security
  • Išparduota

Software Engineering Approaches for Offshore and Outsourced Development
Software Engineering Approaches for Offshore an...
  • Išparduota

Personal Satellite Services
Personal Satellite Services
  • Išparduota

Information Systems: People, Organizations, Institutions, and Technologies
Information Systems: People, Organizations, Ins...
  • Išparduota

Foundations of Security Analysis and Design V
Foundations of Security Analysis and Design V
  • Išparduota

Trust, Privacy and Security in Digital Business
Trust, Privacy and Security in Digital Business
  • Išparduota

Cryptology and Network Security
Cryptology and Network Security
  • Išparduota

Information and Communications Security
Information and Communications Security
  • Išparduota

Software Process Improvement
Software Process Improvement
  • Išparduota

Software Process Dynamics and Agility
Software Process Dynamics and Agility
  • Išparduota

Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems
Information Security Theory and Practices. Smar...
  • Išparduota

Object-Oriented Technology
Object-Oriented Technology
  • Išparduota

Rapid Integration of Software Engineering Techniques
Rapid Integration of Software Engineering Techn...
  • Išparduota

Models in Software Engineering
Models in Software Engineering
  • Išparduota

Critical Information Infrastructures Security
Critical Information Infrastruct... Critis
  • Išparduota

Information Security and Cryptology
Information Security and Cryptology
  • Išparduota

Advances in Information and Computer Security
Advances in Information and Computer Security
  • Išparduota

Model-Driven Architecture - Foundations and Applications
Model-Driven Architecture - Foundations and App...
  • Išparduota

Detection of Intrusions and Malware, and Vulnerability Assessment
Detection of Intrusions and Malware, and Vulner...
  • Išparduota

Smart Card Research and Advanced Applications
Smart Card Research and Advanced Applications
  • Išparduota

Information Security Practice and Experience
Information Security Practice and Experience
  • Išparduota

Formal Aspects in Security and Trust
Formal Aspects in Security and Trust
  • Išparduota

Transactions on Aspect-Oriented Software Development 1
Transactions on Aspect-Oriented Software Develo...
  • Išparduota

Recent Advances in Intrusion Detection
Recent Advances in Intrusion Detection
  • Išparduota

Unifiying the Software Process Spectrum
Unifiying the Software Process Spectrum
  • Išparduota

Model Driven Engineering Languages and Systems
Model Driven Engineering Languages and Systems
  • Išparduota

[{"option":"58","probability":13,"style":{"backgroundColor":"#f3f3f3"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e599c86b351751013788.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"57","probability":14,"style":{"backgroundColor":"#e31e30"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e5981e89e41751013761.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"56","probability":15,"style":{"backgroundColor":"#f3f3f3"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e59691dc2d1751013737.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"55","probability":14,"style":{"backgroundColor":"#e31e30"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e590bade881751013643.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"54","probability":15,"style":{"backgroundColor":"#f3f3f3"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e58f20a7761751013618.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"53","probability":14,"style":{"backgroundColor":"#e31e30"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e58d20c1ee1751013586.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"52","probability":14.5,"style":{"backgroundColor":"#f3f3f3"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e58b358b2e1751013555.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"51","probability":0.5,"style":{"backgroundColor":"#e31e30"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e57cded6da1751013325.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}}]