کتاب های Jean Marc David
Digital Government: Principles and Best Practices
Alexei Pavlichev, G. David Garson, 2003
Digital government: principles and best practices Online access for BTH
Alexei Pavlichev, G. David Garson, 2003
Experiments in Musical Intelligence
David Cope, 1996
Interpreting anaphors in natural language text
David Carter, 1987
Multi-Agent-Based Simulation IX: International Workshop, MABS 2008, Estoril, Portugal, May 12-13, 2008, Revised Selected Papers
Gert Jan Hofstede, Catholijn M. Jonker, Tim Verwaart (auth.), Nuno David, Jaime Simão Sichman (eds.), 2009
Natural language generation systems
David D. McDonald, Leonard Bolc, 1988
Advances in Cryptology — CRYPTO’ 89 Proceedings
David Kahn (auth.), Gilles Brassard (eds.), 1990
Advances in Cryptology — CRYPTO’ 92: 12th Annual International Cryptology Conference Santa Barbara, California, USA August 16–20, 1992 Proceedings
Jurjen N. E. Bos, David Chaum (auth.), Ernest F. Brickell (eds.), 1993
Advances in Cryptology — EUROCRYPT’ 87: Workshop on the Theory and Application of Cryptographic Techniques Amsterdam, The Netherlands, April 13–15, 1987 Proceedings
James L. Massey (auth.), David Chaum, Wyn L. Price (eds.), 1988
Advances in Cryptology: Proceedings of CRYPTO 84
S C Serpell, C B Brookson, B L Clark (auth.), George Robert Blakley, David Chaum (eds.), 1985
Contemporary Cryptology
Dario Catalano, Ronald Cramer, Ivan Damgard, Giovanni Di Crescenzo, David Pointcheval, Tsuyoshi Takagi, 2005
Contemporary Cryptology
Dario Catalano, Ronald Cramer, Ivan Damgard, Giovanni Di Crescenzo, David Pointcheval, Tsuyoshi Takagi, 2005
Contemporary Cryptology
Dario Catalano, Ronald Cramer, Ivan Damgard, Giovanni Di Crescenzo, David Pointcheval, Tsuyoshi Takagi, 2005
Contemporary Cryptology
Dario Catalano, Ronald Cramer, Ivan Damgard, Giovanni Di Crescenzo, David Pointcheval, Tsuyoshi Takagi, 2010
Public Key Cryptography: 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002 Paris, France, February 12–14, 2002 Proceedings
Kouichi Sakurai, Tsuyoshi Takagi (auth.), David Naccache, Pascal Paillier (eds.), 2002
Some Applications of coding theory in cryptography
David Kahn, 2000
Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedings
Silvio Micali, Chris Peikert, Madhu Sudan, David A. Wilson (auth.), Joe Kilian (eds.), 2005
Advanced ANSI SQL Data Modeling and Structure Processing
Michael M. David, 1999
CISA: Certified Information Systems Auditor Study Guide
David L. Cannon, Timothy S. Bergmann, Brady Pamplin, 2006
CISA: Certified Information Systems Auditor Study Guide
David L. Cannon, Timothy S. Bergmann, Brady Pamplin, 2006
CISA: Certified Information Systems Auditor Study Guide
David L. Cannon, 2006
Copy, Rip, Burn: The Politics of Copyleft and Open Source
David Berry, 2008
Enterprise Risk Management Models
David L. Olson, Desheng Wu, 2010
