Secure Programming for Linux and Unix HOWTO
Secure Network Design Office of Nuclear Regulatory Research NUREG/CR-7117
Secure Mobile Access 12.0
Secure Computing SnapGear™ User Manual
Secure
Section - GCC, the GNU Compiler Collection
Seagate Crystal Reports™ 8 User`s Guide
SCG-r53.pdf
Scene of the Cybercrime - Computer Forensics Handbook (Syngress).
SAS Enterprise Case Management 6.3
SAP R/3 Handbook, Second Edition
A Reference Security Management Plan for Energy
A PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENT
A Process Quality Improvement Mechanism for Reducing the Risk of CI Environment
A Practical Introduction to Data Structures and Algorithm Analysis
A Practical Introduction to Data Structures and Algorithm
A PERFORMANCE COMPARISON OF FRAME STRUCTURES IN WIMAX MULTI-HOP RELAY NETWORKS
A PC-kriging-HDMR Integrated with an Adaptive Sequential Sampling Strategy for High-Dimensional Approximate Modeling
A P A M R
A novel methodology for dynamically reconfigurable embedded
A Note on Godel's Theorem