|
|
QA76.87 .S65 1988 : Soveshchanie "Arkhitektura neĭrokomp′︠i︡uterov"
|
|
|
Diskussi︠i︡a o neĭrokomp′︠i︡uterakh / redaktor i otvetstvennyĭ za vypusk V.I. Kr︠i︡ukov.
IU 2nd Floor:AVAILABLE
|
|
1988
|
|
QA76.87 .Y5 2003 : Yi, Zhang.
|
|
|
Convergence analysis of recurrent neural networks / Zhang Yi, K.K. Tan.
IU 2nd Floor:AVAILABLE
|
|
2004
|
|
QA76.9.A23 L64 1986
|
|
|
Logicheskie voprosy teorii tipov dannykh : sbornik nauchnykh trudov / nauchnye redaktory ︠I︡U.L. Ersh
IU 2nd Floor:AVAILABLE
|
|
1986
|
|
QA76.9.A25 A344
|
|
|
ACM transactions on information and system security [electronic resource].
|
|
c1998-
|
|
QA76.9.A25 A456 2001 : Ammann, Paul T.
|
|
|
Windows security programming / Paul T. Ammann.
IU 2nd Floor:AVAILABLE
|
|
2001
|
|
QA76.9.A25 B38513 2002 : Bauer, Friedrich Ludwig,
|
|
|
Decrypted secrets : methods and maxims of cryptology / Friedrich L. Bauer.
IU 2nd Floor:AVAILABLE
|
|
c2002
|
|
QA76.9.A25 C364 2001 : Canavan, John E.
|
|
|
Fundamentals of network security / John E. Canavan.
IU 2nd Floor:AVAILABLE
|
|
c2001
|
|
QA76.9.A25 C6373 1993
|
|
|
Computer security and industrial cryptography : state of the art and evolution : ESAT course, Leuven,
IU 2nd Floor:AVAILABLE
|
|
c1993
|
|
QA76.9.A25 D454 1997 : Bruce, Glen.
|
|
|
Security in distributed computing : did you lock the door? / Glen Bruce, Rob Dempsey.
IU 2nd Floor:AVAILABLE
|
|
c1997
|
|
QA76.9.A25 F658 2000
|
|
|
Foundations of secure computation / edited by Friedrich L. Bauer, Ralf Steinbrüggen.
IU 2nd Floor:AVAILABLE
|
|
c2000
|
|
QA76.9.A25 .I567 2003 : International Workshop on Practice and Theory in Public Key Cryptography
|
|
|
Public key cryptography-PKG 2003 : 6th International Workshop on Practice and Theory in Public Key Cr
IU 2nd Floor:AVAILABLE
|
|
c2002
|
|
QA76.9.A25 K345 1995 : Kaufman, Charlie.
|
|
|
Network security : private communication in a public world / Charlie Kaufman, Radia Perlman, Mike Spe
IU 2nd Floor:AVAILABLE
|
|
c1995
|
|
QA76.9.A25 K66 1999 : Koops, Bert-Jaap.
|
|
|
The crypto controversy : a key conflict in the Information Society / Bert-Jaap Koops.
IU 2nd Floor:AVAILABLE
|
|
c1999
|
|
QA76.9.A25 L338 1987 : Lamère, Jean-Marc.
|
|
|
La sécurité des réseaux : méthodes et techniques / par J.-M. Lamère, Y. Leroux, J. Tourly.
IU 2nd Floor:AVAILABLE
|
|
c1987
|
|
QA76.9.A25 P428 1999 : Peltier, Thomas R.
|
|
|
Information security policies and procedures : a practitioner's reference / Thomas R. Peltier.
IU 2nd Floor:AVAILABLE
|
|
c1999
|
|
QA76.9.A25 S56 1987 : Simposio nazionale su stato e prospettive della ricerca crittografica in Italia
|
|
|
SPRCI '87, Primo Simposio nazionale su stato e prospettive della ricerca crittografica in Italia, Rom
IU 2nd Floor:AVAILABLE
|
|
1988
|
|
QA76.9.A25 T58 2002
|
|
|
Tivoli enterprise management across firewalls / [Stephen Hochstetler ... et al.].
IU 2nd Floor:AVAILABLE
|
|
2002
|
|
QA76.9.A25 W45 1996 : White, Gregory B.
|
|
|
Computer system and network security / Gregory B. White, Eric A. Fisch, Udo W. Pooch.
IU 2nd Floor:AVAILABLE
|
|
c1996
|
|
QA76.9.A73 A25 1999 : Abernethy, Randy.
|
|
|
COM/DCOM unleashed / Randy Abernethy, Randy Morin, Jesús Chahín.
IU 2nd Floor:AVAILABLE
|
|
c1999
|
|
QA76.9.A73 C64
|
|
|
Computer architecture news [electronic resource].
|
|
1972-
|
|
QA76.9.A73 G37 : Garside, R. G.
|
|
|
The Architecture of digital computers / R. G. Garside.
IU 2nd Floor:AVAILABLE
|
|
1980
|
|
QA76.9.A73 G635 2001 : Goedecker, S
|
|
|
Performance optimization of numerically intensive codes / Stefan Goedecker, Adolfy Hoisie.
IU 2nd Floor:AVAILABLE
|
|
c2001
|
|
QA76.9.A73 H55 2000 : Hill, Mark D
|
|
|
Readings in computer architecture / Mark D. Hill, Norman P. Jouppi, Gurindar Sohi.
IU 2nd Floor:AVAILABLE
|
|
2000
|
|
QA76.9.A73 L43 1991 : Lefkovits, Henry C.
|
|
|
IBM's Repository manager/MVS : concepts, facilities, and capabilities / Henry C. Lefkovits.
IU 2nd Floor:AVAILABLE
|
|
c1991
|
|
QA76.9.A73 P37 1990
|
|
|
Parallel architectures and neural networks : second Italian workshop, Vietri sul Mare, Salerno, 26-28
IU 2nd Floor:AVAILABLE
|
|
c1990
|
|
QA76.9.A96 A93 1984
|
|
|
Automated reasoning : introduction and applications / Larry Wos ... [et al.].
TL Books:AVAILABLE
|
|
c1984
|
|
QA76.9.A96 C66 1984 : International Conference on Automated Deduction
|
|
|
7th International Conference on Automated Deduction, Napa, California, USA, May 14-16, 1984 : proceed
TL Books:AVAILABLE
|
|
1984
|
|
QA76.9.A96 I57 1996 : International Conference on Automated Deduction
|
|
|
Automated deduction, CADE-13 : 13th International Conference on Automated Deduction, New Brunswick, N
IU 2nd Floor:AVAILABLE
|
|
c1996
|
|
QA76.9.A96 K87 1993 : Kurt Gödel Colloquium
|
|
|
Computational logic and proof theory : Third Kurt Gödel Colloquium, KGC'93, Brno, Czech Republic, Aug
IU 2nd Floor:AVAILABLE
|
|
1993
|
|
QA76.9.A96 S64 1983 : Special Session on Automatic Theorem Proving
|
|
|
Automated theorem proving : after 25 years / W.W. Bledsoe and D.W. Loveland, editors.
TL Books:AVAILABLE
|
|
1984
|
|
QA76.9.A96 W55 1991 : Williams, James G.
|
|
|
Instantiation theory : on the foundations of automated deduction / J.G. Williams.
IU 2nd Floor:AVAILABLE
|
|
c1991
|
|
QA76.9.B38 B54 1993 : Bjelland, Harley.
|
|
|
Outrageous DR DOS batch file programming / Harley Bjelland and Dan Gookin.
IU 2nd Floor:AVAILABLE
|
|
c1993
|
|
QA76.9.B84 B6
|
|
|
Boardwatch magazine [electronic resource].
|
|
|
|
QA76.9.B84 S54 1995 : Slick, Beth.
|
|
|
BBSs for dummies / by Beth Slick and Steve Gerber.
IU 2nd Floor:AVAILABLE
|
|
c1995
|
|
QA76.9.C55 C54
|
|
|
Client/server computing [electronic resource].
|
|
c1991-
|
|
QA76.9.C55 L69 1995 : Lowe, Doug,
|
|
|
Client/server computing for dummies / by Doug Lowe.
IU 2nd Floor:AVAILABLE
|
|
c1995
|
|
QA76.9.C64 C67 1995 : Callan, James R.
|
|
|
Computer literacy made easy-- and fun : bits, bytes, apples, and mice / James R. Callan ; illustrated
IU 2nd Floor:AVAILABLE
|
|
c1995
|
|
QA76.9.C65 A3
|
|
|
ACM transactions on modeling and computer simulation [electronic resource] : a publication of the Ass
|
|
c1991-
|
|
QA76.9.C65 C656 1993
|
|
|
Computer simulation and computer algebra : lectures for beginners / D. Stauffer ... [et al.].
IU 2nd Floor:AVAILABLE
|
|
c1993
|
|
QA76.9.C65 G67 1984 : Gottfried, Byron S,
|
|
|
Elements of stochastic process simulation / Byron S. Gottfried.
IU 2nd Floor:AVAILABLE
|
|
c1984
|
|
QA76.9.C65 I36 2002 : IEEE International Workshop on Distributed Simulation and Real Time Applications
|
|
|
DS-RT 2002 : Sixth IEEE International Workshop on Distributed Simulation and Real-Time Applications :
IU 2nd Floor:AVAILABLE
|
|
c2002
|
|
QA76.9.C65 I57 1974 : International Seminar on Trends in Mathematical Modelling
|
|
|
New trends in mathematical modelling : proceedings of the 2nd International Seminar on Trends in Math
IU 2nd Floor:AVAILABLE
|
|
1978
|
|
QA76.9.C65 M85 1998 : Muir, Eden.
|
|
|
Inside form·Z : guide to 3D modeling and rendering / Eden Greig Muir, with Cory Clarke and Nam-ho Pa
IU 2nd Floor:AVAILABLE
|
|
1998
|
|
QA76.9.C65 O23 1994 : Object-Oriented Simulation Conference
|
|
|
Object Oriented Simulation Conference : (OOS '94) : proceedings of the 1994 Western Multiconference,
IU 2nd Floor:AVAILABLE
|
|
c1994
|
|
QA76.9.C65 S39 1986 : SCS Simulators Conference
|
|
|
Simulators III : proceedings of the SCS Simulators Conference, 1986 : 10-12 March 1986, Norfolk, Virg
IU 2nd Floor:AVAILABLE
|
|
c1986
|
|
QA76.9.C65 V67 : Voron︠t︡sov, I. N.
|
|
|
Ėlementy teorii / I.N. Voron︠t︡sov.
IU 2nd Floor:AVAILABLE
|
|
1979
|
|
QA76.9.C66 C638 1987
|
|
|
The Computerized society / by the editors of Time-Life Books.
IU 2nd Floor:AVAILABLE
|
|
c1987
|
|
QA76.9.C66 I54 1984
|
|
|
Informatique et société / édité par Nicole Delruelle-Vosswinkel et Emile Peeters.
IU 2nd Floor:AVAILABLE
|
|
1984
|
|
QA76.9.C66 L355 2002 : Lally, Elaine.
|
|
|
At home with computers / Elaine Lally.
IU 2nd Floor:AVAILABLE
|
|
2002
|
|
QA76.9.C66 N42 1984
|
|
|
Negen aspecten van computertechnologie en maatschappij / redactie, L.R. van Dullemen.
IU 2nd Floor:AVAILABLE
|
|
c1984
|
添加已标至书袋
全添加在页
添加已标至我的列表
|