BOOKS - PROGRAMMING - Mobile Biometrics (Security)
Mobile Biometrics (Security) - Guodong Guo and Harry Wechsler 2017 PDF The Institution of Engineering and Technology BOOKS PROGRAMMING
ECO~17 kg CO²

2 TON

Views
12533

Telegram
 
Mobile Biometrics (Security)
Author: Guodong Guo and Harry Wechsler
Year: 2017
Format: PDF
File size: 76 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Build Autonomous Mobile Robot from Scratch using ROS Simulation and Hardware
Программирование для мобильных устройств под управлением Windows Mobile
Simple and Usable Web, Mobile, and Interaction Design, 2nd Edition
Create Mobile Games with Corona Build with Lua on iOS and Android
Mobile Forensic Investigations A Guide to Evidence Collection, Analysis, and Presentation
Professional Flash Mobile Development Creating Android and iPhone Applications
Enterprise Web Development Building HTML5 Applications From Desktop to Mobile
Mobile Ad Hoc Robots and Wireless Robotic Systems Design and Implementation
Introduction to Mobile Network Engineering GSM, 3G-WCDMA, LTE and the Road to 5G
Cloud and Fog Computing in 5G Mobile Networks Emerging advances and applications
Mobile System Design Resourceful Engineering (Early Release v005b)
Networking for Intelligent Transportation Systems High Mobile Wireless Nodes
Xamarin in Action Creating native cross-platform mobile apps
Mobile Photography A Ridiculously Simple Guide to Taking Photos with Your Phone
Mobile Phones and Tablets Repairs A Complete Guide for Beginners and Professionals
Mobile Computing Concepts, Methodologies, Tools, and Applications, 6-volume set
Azure AI Services at Scale for Cloud, Mobile, and Edge (3d Early Release)
Mobile 1С! Пример быстрой разработки мобильного приложения на платформе "1СПредприятие 8.3"
Native Mobile Development A Cross-Reference for iOS and Android, 1st Edition
Learn by Example javascript for Front-End and Mobile App Development
Modern MIDI Sequencing and Performing Using Traditional and Mobile Tools, 2nd Edition
An Untaken Road Strategy, Technology, and the Hidden History of America’s Mobile ICBMs
Mobile Search Behaviors An In-depth Analysis Based on Contexts, APPs, and Devices
Hello, Android Introducing Google|s Mobile Development Platform, 3rd Edition
Самоучитель работы на КПК, коммуникаторе, смартфоне под управлением Windows Mobile
The Wireless Spectrum: The Politics, Practices, and Poetics of Mobile Media (Digital Futures)
Counter-Strike Operations Combat Examples and Leadership Principles of Mobile Defence
An Untaken Road Strategy, Technology, and the Hidden History of America’s Mobile ICBMs
iOS Development at Scale App Architecture and Design Patterns for Mobile Engineers
Third Mobile Window Syndrome of the Inner Ear: Superior Semicircular Canal Dehiscence and Associated Disorders
Learning Android Develop Mobile Apps Using Java and Eclipse, 2nd Edition
Murder in the Study (A Word Travels Mobile Bookshop Cozy Mystery Book 2)
Programming WebAssembly with Rust Unified Development for Web, Mobile, and Embedded Applications
iOS Development at Scale App Architecture and Design Patterns for Mobile Engineers
Mobile, Wireless and Sensor Networks A Clustering Algorithm for Energy Efficiency and Safety
ValueWeb How fintech firms are using bitcoin blockchain and mobile technologies to create the Internet of value
iOS Development at Scale: App Architecture and Design Patterns for Mobile Engineers
.NET MAUI for C# Developers: Build cross-platform mobile and desktop applications
Hacking: Computer Hacking, Security Testing, Penetration Testing and Basic Security
Wild Mustang Security Firm Box Set 1 (Wild Mustang Security #1-3)