Search alternatives:
table bay » table back, table 2a, table bgp
table 1a » table 11a, tables 1a, table 1
table b » table 1, table 2, table 3

1
by Chaput, Bob
Published 2023
Apress
Table of Contents: ...Part I: A Case for Action -- Chapter 1: Enterprise Cyber Risk Management as a Value Creator...

2 Table of Contents: ...); 3.3.2.2.4 -- Linear Regression; 3.3.3 -- Phase 3a: Evaluation of Classifier Ensemble; 3.3.4 -- Phase 3b...

3
by Sheehy, Elizabeth A.
Published 2012
University of Ottawa Press
Table of Contents: .... Sheehy -- part 1. The victories of Jane Doe / Elizabeth A. Sheehy Appendix A. Amended statement of claim...

4
by Gillham, James R.
Published 1992
Springer New York
Table of Contents: ... -- Appendix A: Tables -- Appendix B: Research Methodology -- Appendix C: Layperson’s Simplified Glossary...

5
by Stanley, Karlyn D., Loredo, Elvira N., Burger, Nicholas, Miles, Jeremy
Published 2014
Rand Corporation
Table of Contents: ...Preface -- Figure and Tables -- Summary -- Acknowledgments -- Abbreviations -- 1. Introduction: A...

6
by Levy, Steven
Published 2010
O'Reilly Media
Table of Contents: ...: 1983; Appendix A. The Last of the True Hackers; Appendix B. Afterword: Ten Years After; Appendix C...

7
by Bautista, Wilson
Published 2018
Packt Publishing
Table of Contents: ... of the architectures and cyber intelligence -- A look at strategic cyber intelligence -- level 1 -- Introduction...

8
by Shaaban, Ayman, Sapronov, Konstantin
Published 2016
Packt Publishing
Table of Contents: ... with the newly-connected client -- Start a new flow -- Appendix B: Case Study -- Introduction -- Scenario...

9
by Morewitz, Stephen J.
Published 2004
Springer US
Table of Contents: ...1. Partner Violence: Causes and Risk Factors -- 2. Prevalence of Abuse -- 3. Partner and Child...