-
The Gemini Protocol
Faizal Jalla 出版The Gemini ProtocolA Journey from Inner Conflict to CoherenceThe Gemini Protocol is not a spiritual
-
The Compliance Protocol
How do you fight an enemy who can rewrite your thoughts?In 2037, the world trusts GeneVax, a breakt
-
The Genesis Protocol - The Awakening
When a buried alien structure hums to life beneath a Cretan dig site, Dr. Kaelin Myre uncovers a tr
-
The Convergence Protocol
Earth's last hope was left behind in fragments. Now it's a race to remember.Centuries after the und
-
The Genesis Protocol
When a buried alien structure hums to life beneath a Cretan dig site, Dr. Kaelin Myre uncovers a tr
-
The Relationship Protocol
Are you having trouble communicating with an important person in your life? Are you looking for too
-
Black Vector Protocol
The world has changed.The shadows have learned to think.After the WRAITH incident, every system-eve
-
Black Vector Protocol
The world has changed.The shadows have learned to think.After the WRAITH incident, every system-eve
-
The Uganda Protocol
Terror strikes from inside America's own institutions, turning one agent's manhunt into a fight to
-
The Helios Protocol
In a near-future world driven by surveillance, algorithms, and unrelenting control, Bruce Tucker, a
-
-
The Extinction Protocol
In a future where AI companions have replaced human relationships, global fertility collapses to ca
-
The Kaito Protocol
Ingram 出版Her mind is a weapon. Her memory is the battlefield.A woman awakens on a maglev train hurtling towa
-
The Meridian Protocol
In a world precariously balanced on interconnected systems, a chilling shadow emerges: "The Meridia
-
The Deadlock Protocol
S.M LLC 出版In the sprawling, machine-run city of Virelius, everything hums with cold precision. Unit X was bui
-
Blackout Protocol
A city plunged into darkness. A past that won't stay buried. A race against time to stop the unthin
-
The Giza Park Protocol
Ingram 出版The Giza Park Protocol: How to Start the Sun - Operations Manual #1: Termination of Ice AgeBy Capta
-
The Giza Park Protocol
Ingram 出版The Giza Park Protocol: How to Start the Sun - Operations Manual #1: Termination of Ice AgeBy Capta
-
Automating Security Protocol Analysis
Ingram 出版When Roger Needham and Michael Schroeder first introduced a seemingly secure protocol [24], it took
-
Performance Analysis of Protocol Independent Multicasting-Dense Mode in Low Earth Orbit Satellite Networks
This research explored the implementation of Protocol Independent Multicasting - Dense Mode (PIM-DM
-
Alabama Attorney General's Office Sexual Assault Task Force Protocol for the Examination and Treatment of Victims of Sexual Assault
The Alabama Department of Archives and History was founded in 1901 and became a model for many othe
-
Juvenile Sex Offender Assessment Protocol-II (J-SOAP-II) Manual
Presents an instrument for assessing risk factors in boys ages 12-18 who have been adjudicated for
-
Alabama Attorney General's Office Sexual Assault Task Force Protocol for the Examination and Treatment of Victims of Sexual Assault
The Alabama Department of Archives and History was founded in 1901 and became a model for many othe
-
Performance Analysis of Protocol Independent Multicasting-Dense Mode in Low Earth Orbit Satellite Networks
This research explored the implementation of Protocol Independent Multicasting - Dense Mode (PIM-DM
-
Supplementing an Ad Hoc Wireless Network Routing Protocol With Radio Frequency Identification Tags
Wireless sensor networks (WSNs) have a broad and varied range of applications, yet all of these are
-
Automating Security Protocol Analysis
When Roger Needham and Michael Schroeder first introduced a seemingly secure protocol [24], it took
-
Dynamic Protocol Reverse Engineering
Ingram 出版Round trip engineering of software from source code and reverse engineering of software from binary
-
Internet Protocol Geolocation
Ingram 出版Internet Protocol Geolocation (IP Geolocation), the process of determining the approximate geograph
-
Evaluation of the Ad Hoc On-Demand Distance Vector Routing Protocol for Mobile Ad Hoc Networks
Routing protocols designed for wired networks cannot be used in mobile ad hoc networks (MANETs) due
-
Internet Protocol Over Link-16
The purpose of Link-16 is to exchange real-time tactical data among units of the United States and
-
Simple Public Key Infrastructure Analysis Protocol Analysis and Design
Secure electronic communication is based on secrecy, authentication and authorization. One means of
-
Evaluation of the Ad Hoc On-Demand Distance Vector Routing Protocol for Mobile Ad Hoc Networks
Routing protocols designed for wired networks cannot be used in mobile ad hoc networks (MANETs) due
-
Internet Protocol Over Link-16
The purpose of Link-16 is to exchange real-time tactical data among units of the United States and
-
Dynamic Protocol Reverse Engineering
Round trip engineering of software from source code and reverse engineering of software from binary
-
The Montreal Protocol And Global Warming
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Protocol Book Of Robert Broun
"Protocol Book Of Robert Broun, Volume 8" offers a detailed glimpse into the legal and social lands
-
Ghost Protocol
Ghost Protocol: Off-Grid Solar Living gives insight into how one person realizes she has the streng
-
Ghost Protocol
Ghost Protocol: Off-Grid Solar Living gives insight into how one person realizes she has the streng
-
S. 1427, the Antarctic Scientific Research, Tourism, and Marine Resources Act of 1993, to Implement the Protocol on Environmental Protection to the Antarctic Treaty
This document contains the hearing record for S. 1427, the "Antarctic Scientific Research, Tourism,
-
Supplementing an Ad Hoc Wireless Network Routing Protocol With Radio Frequency Identification Tags
Wireless sensor networks (WSNs) have a broad and varied range of applications, yet all of these are
-
A Novel Communications Protocol Using Geographic Routing for Swarming UAVs Performing a Search Mission
This research develops the UAV Search Mission Protocol (USMP) for swarming UAVs and determines the
-
Protocol Book Of Robert Broun
"Protocol Book Of Robert Broun, Volume 8" offers a detailed glimpse into the legal and social lands
-
A Novel Communications Protocol Using Geographic Routing for Swarming UAVs Performing a Search Mission
This research develops the UAV Search Mission Protocol (USMP) for swarming UAVs and determines the
-
Internet Protocol Geolocation
Internet Protocol Geolocation (IP Geolocation), the process of determining the approximate geograph
-
Simple Public Key Infrastructure Analysis Protocol Analysis and Design
Secure electronic communication is based on secrecy, authentication and authorization. One means of
-
International Performance Measurement and Verification Protocol
This protocol serves as a framework to determine energy and water savings resulting from the implem
-
International Performance Measurement and Verification Protocol
This protocol serves as a framework to determine energy and water savings resulting from the implem
-
The Gibraltar Protocol
Pedro Avery 出版The Gibraltar Protocol: A Daniel Warren ThrillerWhen a cyber-terrorist known only as "Spider" threa