يعرض 1 - 10 نتائج من 175 نتيجة بحث عن '"Smith, Ned"', وقت الاستعلام: 1.03s تنقيح النتائج
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
    كتاب إلكتروني

    المؤلفون: Cheruvu, SunilAff5, Kumar, AnilAff5, Smith, NedAff6, Wheeler, David M.Aff7

    المساهمون: Cheruvu, SunilAff1, Kumar, AnilAff2, Smith, NedAff3, Wheeler, David M.Aff4

    المصدر: Demystifying Internet of Things Security : Successful IoT Device/Edge and Platform Security Deployment. :413-462

  6. 6
    كتاب إلكتروني

    المؤلفون: Cheruvu, SunilAff5, Kumar, AnilAff5, Smith, NedAff6, Wheeler, David M.Aff7

    المساهمون: Cheruvu, SunilAff1, Kumar, AnilAff2, Smith, NedAff3, Wheeler, David M.Aff4

    المصدر: Demystifying Internet of Things Security : Successful IoT Device/Edge and Platform Security Deployment. :23-148

  7. 7
    كتاب إلكتروني

    المؤلفون: Cheruvu, SunilAff5, Kumar, AnilAff5, Smith, NedAff6, Wheeler, David M.Aff7

    المساهمون: Cheruvu, SunilAff1, Kumar, AnilAff2, Smith, NedAff3, Wheeler, David M.Aff4

    المصدر: Demystifying Internet of Things Security : Successful IoT Device/Edge and Platform Security Deployment. :213-346

  8. 8
    كتاب إلكتروني

    المؤلفون: Cheruvu, SunilAff5, Kumar, AnilAff5, Smith, NedAff6, Wheeler, David M.Aff7

    المساهمون: Cheruvu, SunilAff1, Kumar, AnilAff2, Smith, NedAff3, Wheeler, David M.Aff4

    المصدر: Demystifying Internet of Things Security : Successful IoT Device/Edge and Platform Security Deployment. :347-411

  9. 9
    كتاب إلكتروني

    المؤلفون: Cheruvu, SunilAff5, Kumar, AnilAff5, Smith, NedAff6, Wheeler, David M.Aff7

    المساهمون: Cheruvu, SunilAff1, Kumar, AnilAff2, Smith, NedAff3, Wheeler, David M.Aff4

    المصدر: Demystifying Internet of Things Security : Successful IoT Device/Edge and Platform Security Deployment. :149-212

  10. 10
    كتاب إلكتروني

    المؤلفون: Cheruvu, SunilAff5, Kumar, AnilAff5, Smith, NedAff6, Wheeler, David M.Aff7

    المساهمون: Cheruvu, SunilAff1, Kumar, AnilAff2, Smith, NedAff3, Wheeler, David M.Aff4

    المصدر: Demystifying Internet of Things Security : Successful IoT Device/Edge and Platform Security Deployment. :1-21