Search alternatives:
computer world » computer worlds, computer word, computer wird
complete works » complex networks
computer worms » computer terms, computers work, computer networks
computer works » computers work, computer networks, computers networks

1
by Lombard, Matt
Published 2019
Sybex
Table of Contents: ... Is Covered in This Book -- Part I: Introducing SolidWorks Basics -- Part II: Building Intelligence into Your...

2
by Gleeson, Patrick
Published 2017
Apress
Subjects: ...COMPUTERS / Software Development & Engineering / General / bisacsh...

3
by Banson, William
Published 1717
printed for Benj. Tooke at the Middle Temple Gate in Fleet-Street, and Ralph Smith under the Piazza of the Royal Exchange in Cornhill
Subjects: ...Foreign exchange / Early works to 1800...

4
by Mittal, Kunal, Gupta, Shikha, Gupta, Neeraj
Published 2010
Apress
Table of Contents: ...: Blackberry as an iPod. 14: Understanding AppWorld. 15: General Business Apps. - Apps that any business needs...

5
by Verhulst, Stefaan G.
Published 2017
African Minds
Subjects: ...Computing and Information Technology...

6
by Verhulst, Stefaan G.
Published 2017
African Minds
Subjects: ...developing world...

7
by Moss, Greg
Published 2018
Packt Publishing
Table of Contents: ...Implementing Odoo using a modular approach -- Introducing Silkworm -- our real-world case study...

8
Published 1996
Springer London
Table of Contents: ...Section 1 Writers at Work: Expanding the Notion of Writing -- Section 1: Contents -- Section 1...

9
Published 2023
Packt Publishing
Subjects: ...Python (Computer program language) / Study guides...

10
by Lombard, Matt
Published 2013
InfiniteSkills
Subjects: ...computer-aided designs (visual works) / aat...

11
by Tynan, Dan
Published 2005
O'Reilly
Table of Contents: ...1. Privacy at risk -- The spy on your desk -- Dawn of the undead PC -- Working for the man...

12
Published 2017
Springer International Publishing
Table of Contents: ... of Strategy Games on Physarum Machines -- Computing a Worm: Reverse-Engineering Planarian Regeneration...

13 Table of Contents: ...-Based Vulnerabilities -- Application-Based Weaknesses -- How E-mail Works -- Security of E-mail -- Mail...

14
by Goralski, Walter
Published 2009
Elsevier/Morgan Kaufmann Publishers
Subjects: ...COMPUTERS / Networking / Network Protocols / bisacsh...

15
by Vacca, John R.
Published 2013
Morgan Kaufmann Publishers is an imprint of Elsevier
Table of Contents: ....The Computer Age -- 6.How AES Works -- 7.Selecting Cryptography: the Process -- 8.Summary -- Chapter Review...

16
by Chuat, Laurent, Legner, Markus, Basin, David, Hausheer, David
Published 2022
Springer International Publishing
Table of Contents: ... and Filtering -- Extensions for the Data Plane -- Availability Guarantees -- IV SCION in the Real World -- Host...

17
Published 2010
Springer New York
Table of Contents: ... Work on Rates of Convergence in the Central Limit Theorem -- Chris Heyde’s Work in Probability Theory...

18
by Gould, David A. D.
Published 2003
Morgan Kaufmann Publishers
Subjects: ...Maya (Computer file) / fast...

19
Published 2000
Springer Berlin Heidelberg
Table of Contents: ...Conferences and Trade Shows in Inhabited Virtual Worlds: A Case Study of Avatars98 & 99...

20
by Axelrod, Arnon
Published 2018
Apress
Table of Contents: ... for the tutorial -- Designing the first test case -- Start coding the first test -- Completing the first test...