Research methods in social relations
By: Material type:
TextLanguage: English Publication details: London Methuen UK 1959Edition: Revised editionDescription: xvi, 622p. cmSubject(s): DDC classification: - sigma b4, J9/TD25
General Books
No physical items for this record
Bibliography: p 589-606; Appendix: p 502-88; 2 V in one
There are no comments on this title.
Log in to your account to post a comment.
-
1
Case studies in secure computing
-
2
Data communications and networking
by Forouzan, Behrouz A -
3
Data warehousing and data mining techniques for cyber security
by Singhal Anoop -
4
Data warehousing and data mining techniques for cyber security
by Singhal Anoop -
5
Digital watermarking and steganography: Fundamentals and techniques
by Shih Frank Y -
6
Emerging security algorithms and techniques
by Ahmad Khaleel Ed. -
7
Enhancing cryptographic pimitives with techniques from error correcting codes
by Preneel Bart Ed. -
8
Evaluating indirect and direct classification techniques for network intrusion detection
by Ibrahim Nawal H -
9
Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography
by Dube Roger -
10
Intelligence and security informatics:techniques and applications
by Chen Hsinchun Ed. -
11
Multimedia security: steganography and digital watermarking techniques for protection of intellectual property
by Lu Chun-Shien -
12
Operating systems : Integrals and design principles
by Stalling Williams -
13
Operating systems : Integrals and design principles
by Stalling Williams -
14
Operating systems : Integrals and design principles
by Stalling Williams -
15
Practical Data Mining
by Hancock, Monte F. -
16
REID security:techniques, protocols and system-on-chip design
by Kitsos Paris Ed. -
17
Security Enhancement Techniques for efficient routing in opportunistic internet of things
by Kandhoul Nisha Au. -
18
Soft computing techniques for intrusion detection
by Gomez Jonatan -
19
Statistical Pattern Recognition
by Webb, Andrew R. -
20
Techniques for combining binary classifiers: A comparative study in network intrusion detection systems
by Lin Hua -
21
Techniques for enhancing the security of android framework
by Verma Sushma Au. -
22
Techniques for security in grid computing
by Bhatia Manjot Kaur Au. -
23
Wireless security and privacy: best practices and design techniques
by Swaminatha Tara M
Research methods in social relations
APA
Selltiz Clair a. o., . (1959). Research methods in social relations. London: Methuen UK.
Chicago
Selltiz Clair and others, . 1959. Research methods in social relations. London: Methuen UK.
Harvard
Selltiz Clair a. o., . (1959). Research methods in social relations. London: Methuen UK.
MLA
Selltiz Clair and others, . Research methods in social relations. London: Methuen UK. 1959.
