Results
|
261.
|
|
Image from Amazon.com
|
|
|
262.
|
|
Image from Amazon.com
|
|
|
263.
|
|
Image from Amazon.com
|
|
|
264.
|
|
Image from Amazon.com
|
|
|
265.
|
|
|
|
|
266.
|
|
|
|
|
267.
|
|
Image from Amazon.com
|
|
|
268.
|
|
Image from Amazon.com
|
|
|
269.
|
|
Image from Amazon.com
|
|
|
270.
|
|
Image from Amazon.com
|
|
|
271.
|
|
Image from Amazon.com
|
|
|
272.
|
|
Image from Amazon.com
|
|
|
273.
|
|
Image from Amazon.com
|
|
|
274.
|
|
Image from Amazon.com
|
|
|
275.
|
|
Image from Amazon.com
|
|
|
276.
|
|
Image from Amazon.com
|
Security, privacy, trust, and resource management in mobile and wireless communications / Danda B. Rawat, Bhed B. Bista, and Gongjun Yan, editors. by Publisher: Hershey, Pennsylvania (701 E. Chocolate Ave., Hershey, PA, 17033) : IGI Global, [2014]
Availability: No items available.
|
|
277.
|
|
Image from Amazon.com
|
|
|
278.
|
|
Image from Amazon.com
|
|
|
279.
|
|
|
|
|
280.
|
|
Image from Amazon.com
|
|