نتایج جستجو
Computer Security
John M. Carroll (Auth.), 1987
Computer-Aided Scheduling of Public Transport
Mohamadreza Banihashemi, 2001
Computer-Aided Scheduling: An Airline Perspective
Leena Suhl (auth.), 1995
Computer-Aided Transit Scheduling: Proceedings, Cambridge, MA, USA, August 1997
Alberto Caprara, 1999
Applied Cryptology, Cryptographic Protocols, and Computer Security Models
Richard A. Demillo (ed.), 1983
Handbook of Mathematical Models in Computer Vision
Nikos Paragios, 2006
Handbook of Mathematical Models in Computer Vision
Nikos Paragios, 2005
Handbook of mathematical models in computer vision
Nikos Paragios, 2006
Handbook of Mathematical Models in Computer Vision
J. Weickert, 2006
Handbook of Mathematical Models in Computer Vision
Nikos Paragios, 2005
Emerging Technology Programs: ADM, Hybrids, Computer Forensics, and MEMS
John Vanston, 2005
Assembly Language Programming for the TRS-80 Color Computer
Laurence A. Tepolt, 1985
Trojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code
Michael Erbschloe, 2004
Trojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code
Michael Erbschloe, 2004
Help Your Kids with Computer Coding
Sam Priddy, 2014
