Showing 461 - 480 results of 1,325 for search '"IT operations"', query time: 0.04s Refine Results
  1. 461
  2. 462
  3. 463
  4. 464

    A general attack model based on Android system vulnerability by Xihai DENG, Weimiao FENG, Luping MA, Ying LI

    Published 2016-10-01
    Subjects: “…Android operating system…”
    Get full text
    Article
  5. 465
  6. 466
  7. 467

    Elliptic Riesz operators on the weighted special atom spaces by Kuang Jichang

    Published 1996-01-01
    Subjects: “…elliptic Riesz operators…”
    Get full text
    Article
  8. 468
  9. 469
  10. 470
  11. 471
  12. 472
  13. 473
  14. 474
  15. 475
  16. 476
  17. 477
  18. 478
  19. 479
  20. 480