نتایج جستجو
Hardware-based computer security techniques to defeat hackers
Dube R.R., 2008
Breakdowns in Computer Security. Commentary and Analysis
Michael E Rentell, 1991
Your Family Tree Online: How to Trace Your Ancestry from Your Own Computer
Graeme Davis, 2009
From Compass to Computer: A History of Electrical and Electronics Engineering
W. A. Atherton (auth.), 1984
Data & Computer Security: Dictionary of standards concepts and terms
Dennis Longley, 1989
Algorithm Design for Computer System Design
G. Ausiello, 1984
Discrete Mathematics Using a Computer
Cordelia Hall PhD, 2000
Discrete Mathematics Using a Computer
John O’Donnell PhD, 2006
Principles of Computer Graphics [Using OpenGL and Maya
Shalini Govil-Pai, 2005
Principles of Computer Graphics: Theory and Practice Using OpenGL and Maya®
Shalini Govil-Pai (auth.), 2005
Intelligent Computer Systems in Engineering Design: Principles and Applications
Staffan Sunnersjo (auth.), 2016
Computer-aided Maintenance: Methodologies and Practices
Gerald M. Knapp, 1999
Advances in Computer Graphics Hardware IV
Bengt-Olaf Schneider (auth.), 1991
