کتاب های L. James Lee

Advances in Computer Systems Architecture: 9th Asia-Pacific Conference, ACSAC 2004, Beijing, China, September 7-9, 2004. Proceedings
James E. Smith (auth.), Pen-Chung Yew, Jingling Xue (eds.), 2004
A laboratory course in C++ data structures
James Roberge, 2003
A laboratory course in C++ data structures
James Roberge, 2003
A Laboratory Course in C++ Data Structures
James Roberge, 2003
Seeing: The Computational Approach to Biological Vision
John P. Frisby, James V. Stone, 2010
AI 2003: Advances in Artificial Intelligence: 16th Australian Conference on AI, Perth, Australia, December 3-5, 2003. Proceedings
Kotagiri Ramamohanarao, James Bailey (auth.), Tamás (Tom) Domonkos Gedeon, Lance Chun Che Fung (eds.), 2003
Natural language understanding
James Allen, 1995
Advances in Cryptology — EUROCRYPT’ 87: Workshop on the Theory and Application of Cryptographic Techniques Amsterdam, The Netherlands, April 13–15, 1987 Proceedings
James L. Massey (auth.), David Chaum, Wyn L. Price (eds.), 1988
Elementary Number Theory, Cryptography and Codes
James E. Gentle, 2009
Progress in Cryptology - INDOCRYPT 2006: 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings
James L. Massey (auth.), Rana Barua, Tanja Lange (eds.), 2006
CISSP (r): Certified Information Systems Security Professional Study Guide, 2nd Edition
Ed Tittle, James Michael Stewart, Mike Chapple, Ed Tittel, 2004
CISSP: Certified Information Systems Security Professional Study Guide
Ed Tittle, James Michael Stewart, Mike Chapple, Ed Tittel, 2004
CISSP: Certified Information Systems Security Professional Study Guide
James Michael Stewart, Ed Tittel, Mike Chapple, 2005
CISSP: Certified Information Systems Security Professional Study Guide
Ed Tittel, Mike Chapple, James Michael Stewart, 2003
CISSP: Certified Information Systems Security Professional study guide
Ed Tittel, Mike Chapple, James Michael Stewart, 2003
CISSP: Certified Information Systems Security Professional study guide
Ed Tittel, Mike Chapple, James Michael Stewart, 2003
CISSP: Certified Information Systems Security Professional study guide
Ed Tittle, James Michael Stewart, Mike Chapple, Ed Tittel, 2004
CISSP: Certified Information Systems Security Professional study guide
Ed Tittle, James Michael Stewart, Mike Chapple, Ed Tittel, 2004
CISSP: Certified Information Systems Security Professional study guide
Ed Tittel, Mike Chapple, James Michael Stewart, 2003
CISSP: Certified Information Systems Security Professional study guide
Ed Tittle, James Michael Stewart, Mike Chapple, Ed Tittel, 2004
CISSP: Certified Information Systems Security Professional Study Guide
James M. Stewart, Ed Tittel, Mike Chapple, 2008
Enterprise Risk Management: From Incentives to Controls
James Lam, 2003
Piracy: Leakages from Modernity
Martin Fredriksson and James Arvanitakis, 2014
Promoting Enterprise-led Innovation in China (Directions in Development) (Directions in Development, Countries and Regions)
Chunlin Zhang, Douglas Zhihua Zeng, William Peter Mako, James Seward, 2009