نتایج جستجو
Machine Learning and Data Mining for Computer Security: Methods and Applications
Marcus A. Maloof (auth.), 2006
Computer Fraud Casebook: The Bytes that Bite
Joseph T. Wells, 2009
Computer Fraud Casebook: The Bytes that Bite
Joseph T. Wells, 2009
Computer Fraud Casebook: The Bytes that Bite
Joseph T. Wells, 2009
Product Design Modeling Using CAD/CAE. The Computer Aided Engineering Design Series
Kuang-Hua Chang (Auth.), 2014
Product Design Modeling using CADCAE The Computer Aided Engineering Design Series
Kuang-Hua Chang, 2014
Product Manufacturing and Cost Estimating Using Cad/Cae. The Computer Aided Engineering Design Series
Kuang-Hua Chang (Auth.), 2013
When the Machine Made Art: The Troubled History of Computer Art
Grant D. Taylor, 2014
Introductory Theory of Computer Science
E. V. Krishnamurthy (auth.), 1983
Encyclopedia of Computer Science and Engineering
Benjamin W. Wah, 2009
Encyclopedia of Physical Science and Technology, 3e, Computer Hardware
Robert Allen Meyers, 2006
Encyclopedia of Physical Science and Technology, 3e, Computer Software
Robert Allen Meyers, 2007
Dense Image Correspondences for Computer Vision
Tal Hassner, 2016
Firewall Design and Analysis (Computer and Network Security)
Alex X. Liu, 2010
