نتایج جستجو
Some Applications of coding theory in cryptography
David Kahn, 2000
Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedings
Silvio Micali, Chris Peikert, Madhu Sudan, David A. Wilson (auth.), Joe Kilian (eds.), 2005
Advanced ANSI SQL Data Modeling and Structure Processing
Michael M. David, 1999
CISA: Certified Information Systems Auditor Study Guide
David L. Cannon, Timothy S. Bergmann, Brady Pamplin, 2006
CISA: Certified Information Systems Auditor Study Guide
David L. Cannon, Timothy S. Bergmann, Brady Pamplin, 2006
CISA: Certified Information Systems Auditor Study Guide
David L. Cannon, 2006
Copy, Rip, Burn: The Politics of Copyleft and Open Source
David Berry, 2008
Enterprise Risk Management Models
David L. Olson, Desheng Wu, 2010
Enterprise Security: The Manager's Defense Guide
David Leon Clark, 2002
GarageBand2: The Missing Manual
David Pogue, 2005
iLife '05: The Missing Manual
David Pogue, 2005
iMovie 6 & iDVD: The Missing Manual
David Pogue, 2006
iMovie HD & iDVD 5: The Missing Manual
David Pogue, 2005
iPhone: The Missing Manual: Covers the iPhone 3G
David Pogue, 2008
iPhone: The Missing Manual: Covers the iPhone 3G
David Pogue, 2008
iPhone: The Missing Manual: Covers the iPhone 3G
David Pogue, 2008
New Frontiers in Enterprise Risk Management
D. L. Olson, D. Wu (auth.), Prof. David L. Olson, Prof. Desheng Wu (eds.), 2008
Regulating Enterprise: Law and Business Organisation in the Uk
David Milman, 1999
Renewing Neighbourhoods: Work, Enterprise and Governance
Stephen Syrett, David North, 2008
Revolutionizing IT: The Art of Using Information Technology Effectively
David H. Andrews, Kenneth R. Johnson, 2002
Switching to the Mac: The Missing Manual, Snow Leopard Edition
David Pogue, 2009
The E-Business Workplace: Discovering the Power of Enterprise Portals
PricewaterhouseCoopers LLP, SAP AG, Brenda MacKay, David J. Duray, 2001
