نتایج جستجو

Digital Computer and Control Engineering
Robert Steven Ledley, 1960
Introduction to Computer Science Using Python: A Computational Problem-Solving Focus
Charles Dierbach, 2012
Computer Science: A Structured Approach Using C
Behrouz A. Forouzan; Richard F. Gilberg, 2006
Computer Training. Windows 10
Wilson K., 2015
Introduction to Computer Graphics: A Practical Learning Approach
Fabio Ganovelli;Massimiliano Corsini;Sumanta Pattanaik;Marco di Benedetto, 2015
Media Computer System for the Altera DE2 Board: Manual
Altera Corporation, 2011
The Complete Guide to Blender Graphics: Computer Modeling & Animation
John M. Blain, 2016
Essentials of Computer Architecture, Second Edition
COMER, DOUGLAS, 2017
Bioinformatics challenges at the interface of biology and computer science: mind the gap
Attwood, Teresa K.; Pettifer, Stephen Robert; Thorne, David, 2016
Computer- aided inspection planning: theory and practice
Abdulhameed, Osama; Al-Ahmari, Abdulrahman M.; Nasr, Emad Abouel, 2017
Guide to Computer Forensics and Investigations
Bill Nelson, Amelia Phillips, Christopher Steuart, 2015
Testing computer software
Cen Kaner
Deviant Security - The Technical Computer Security Practices of Cyber Criminals
Eric Van De Sandt, 2019
Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century
Joshua B. Hill, Nancy E. Marion, 2016
The Art of Computer Systems Performance Analysis
Raj K. Jain, 1991
The Art Of War For Computer Security
Tom Madsen, 2019
Hackers & Painters: Big Ideas from the Computer Age
Paul Graham, 2004
Computer-aided Technologies: Applications in Engineering and Medicine
Razvan Udroiu, 2016
Probability and Statistics with Reliability, Queueing, and Computer Science Applications
Kishor Shridharbhai Trivedi, 2001
Computer-Based Industrial Control
Kant, Krishna, 2011