نتایج جستجو

Artificial Intelligence on the Sinclair QL: Make Your Micro Think
Keith Brain, Steven Brain, 1984
Elements of Artificial Intelligence: An Introduction Using LISP
Steven L. Tanimoto, 1990
Advances in Cryptology — CRYPTO 2001: 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19–23, 2001 Proceedings
Boaz Barak, Oded Goldreich, Rusell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan (auth.), Joe Kilian (eds.), 2001
Cryptography and Coding: 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedings
Jonathan Katz (auth.), Steven D. Galbraith (eds.), 2007
Pairing-Based Cryptography – Pairing 2008: Second International Conference, Egham, UK, September 1-3, 2008. Proceedings
Liqun Chen, Paul Morrissey, Nigel P. Smart (auth.), Steven D. Galbraith, Kenneth G. Paterson (eds.), 2008
Access Database Design & Programming
Steven PhD, 2002
Access Database Design & Programming
Steven PhD
Emergence: The Connected Lives of Ants, Brains, Cities, and Software
Steven Johnson, 2002
E-Business and ERP: Transforming the Enterprise
Steven J. Luck, 2005
Enterprise Architecture at Work: Modelling, Communication and Analysis
Wim Van Grembergen, Steven De Haes, 2005
Enterprise governance of information technology: achieving strategic alignment and value
Steven De Haes, Wim Van Grembergen (auth.), 2009
Enterprise Governance of Information Technology: Achieving Strategic Alignment and Value
Steven De Haes, Wim Van Grembergen (auth.), 2009
Access Database Design & Programming
Steven Roman, 2002![Access database design & programming: [what you really need to know to develop with access]](http://cdn.ketabkoo.com/covers/0/73728-n.jpg)
Access database design & programming: [what you really need to know to develop with access]
Steven Roman PhD, 1999
Access database design and programming
Steven Roman, 2002
Access database design and programming
Steven Roman, 2002
WIN32 API Programming with Visual Basic
Steven Roman, 1999
ADO.NET Programming in Visual Basic .NET
Steven Holzner, Bob Howell, 2003
ADO.NET Programming in Visual Basic .NET
Steven Holzner, Bob Howell, 2003
Firewalls and Internet Security: Repelling the Wily Hacker
William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin, 2003
Firewalls and Internet Security: Repelling the Wily Hacker
William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin, 2003
Hackers: Heroes of the Computer Revolutio
Steven Levy, 1985