Sign In
Sign Up
Security in pervasive computing
International Conference on Security in Pervasive Computing (2nd 2005 Boppard, Germany)
-
/
5
0 votes
Securite
Kryptosystem
Securite Informatique
Hackers
4.1
21 votes
The Cathedral and the Bazaar
4.3
16 votes
The Phoenix Project
4.1
52 votes
Ghost in the wires
4.1
17 votes
Don't Make Me Think
4.1
15 votes
Code
4.3
21 votes
Structure and Interpretation of Computer Programs (SICP)
4.4
21 votes
The Cuckoo’s Egg
3.9
18 votes
In the Beginning...Was the Command Line
3.7
22 votes
The Pragmatic Programmer
4.4
41 votes
The Mythical Man-Month
4.2
28 votes
The C Programming Language
4.3
36 votes
No Place to Hide
4.1
18 votes
The Shallows
3.3
15 votes
Halting State
3.5
18 votes
The Soul of a New Machine
4.1
15 votes
Coders at Work
4.0
18 votes
Thinking in systems
4.4
22 votes
Homeland
3.8
21 votes
The Code Book
4.0
35 votes
Artificial intelligence
4.2
20 votes
Algorithms to Live By
4.0
37 votes
Masters of Doom
4.1
32 votes
The Intelligent Investor
4.6
38 votes
Trading in the zone
4.1
34 votes
Little Brother
4.0
49 votes
The Circle
3.1
22 votes
Microserfs
4.0
18 votes
Code Complete
4.2
22 votes
JavaScript
4.1
30 votes
Hackers & painters
4.0
16 votes
Steve Jobs
4.1
141 votes
The Difference Engine
3.3
22 votes
The Laws of Human Nature
4.1
66 votes
The Man Who Mistook His Wife for a Hat and Other Clinical Tales
4.1
53 votes
Clean Code
4.4
35 votes
The intelligent investor
3.9
26 votes
The Intelligent Investor
3.7
15 votes
Daemon
4.1
44 votes
The Innovators
3.9
18 votes
Rogue protocol
4.2
66 votes
Confessions of an economic hit man
3.4
15 votes
The 4-Hour Work Week
3.7
69 votes
Silent Spring
3.9
15 votes
The God of Small Things
3.8
58 votes
Persuasion
4.3
33 votes
Marketing management
4.0
27 votes
Blink
3.8
76 votes