55471 |
|
Agoston M.K. |
Computer Graphics and Geometric Modeling: Mathematics |
2005 | •• |
128783 |
|
Max K. Agoston |
Computer Graphics and Geometric Modeling. Implementation and Algorithms |
2005 • | •• |
189863 |
|
0 |
Computer Graphics 5 |
n/a | •• |
155990 |
|
Hill F.S. |
Computer Graphics |
1990 | •• |
169957 |
|
Hearn D., Baker M. |
Computer Graphics |
1986 | •• |
166470 |
|
Ðûæêîâ Â |
Computer Gaming World Russian Edition |
2005 | •• |
17421 |
|
|
Computer Gaming World (Issue 268, November 2006) |
2006 | •• |
15761 |
|
|
Computer Gaming World (Issue 267, October 2006) |
2006 | •• |
14118 |
|
|
Computer Gaming World (Issue 266, September 2006) |
2006 | •• |
14116 |
|
|
Computer Gaming World (Issue 265, August 2006) |
2006 | •• |
14115 |
|
|
Computer Gaming World (Issue 264, July 2006) |
2006 | •• |
15464 |
|
|
Computer Gaming World (Issue 261, April 2006) |
2006 | •• |
14117 |
|
|
Computer Gaming World (Issue 260, March 2006) |
2006 | •• |
15511 |
|
|
Computer Gaming World (Issue 251, May 2006) |
2006 | •• |
172691 |
|
Levy D.N.L. |
Computer gamesmanship: The complete guide to creating and structuring intelligent games programs |
1983 | •• |
154397 |
|
Jahn-Sudmann A., Stockmann R. |
Computer Games as a Sociocultural Phenomenon: Games Without Frontiers, Wars Without Tears |
2008 | •• |
42468 |
|
Trumbauer L. |
Computer Fun Math |
1999 | •• |
156060 |
|
Wells J. |
Computer Fraud Casebook: The Bytes that Bite |
2002 | •• |
159903 |
|
Wells J. |
Computer Fraud Casebook: The Bytes that Bite |
2009 | •• |
164998 |
|
Wells J. |
Computer Fraud Casebook: The Bytes that Bite |
2009 | •• |
114670 |
|
Hilley S. (Ed.) |
Computer Fraud & Security Journel |
2004 | •• |
171708 |
|
Vacca J. |
Computer Forensics: Computer Crime Scene Investigation ~ 2nd Edition (Networking Series) |
2005 • | •• |
27535 |
|
Vacca J., Erbschloe M. |
Computer Forensics: Computer Crime Scene Investigation |
2002 • | •• |
165697 |
|
Clarke N, |
Computer Forensics: A Pocket Guide |
2010 | •• |
166896 |
|
Clarke N. |
Computer Forensics: A Pocket Guide |
2010 | •• |
131640 |
|
Clarke N. |
Computer Forensics. A Pocket Guide |
2010 | •• |
22833 |
|
Solomon M., Broom N., Barrett D. |
Computer Forensics JumpStart |
2004 | •• |
191428 |
|
Solomon M., Broom N., Barrett D. |
Computer Forensics JumpStart |
2005 | •• |
190046 |
|
Volonino L., Anzaldua R. |
Computer Forensics For Dummies (For Dummies (Computer Tech)) |
2008 | •• |
128142 |
|
Volonino L., Anzaldua R. |
Computer Forensics for Dummies |
2008 | •• |
177493 |
|
Volonino L., Anzaldua R. |
Computer Forensics For Dummies |
2008 | •• |
157604 |
|
Buck J.R., Daniel M.M., Singer A.C. |
Computer Explorations in Signals and Systems Using MATLAB |
1996 | •• |
169864 |
|
Brown C. |
Computer Evidence: Collection and Preservation, Second Edition |
2010 • | •• |
149266 |
|
Brown C. |
Computer Evidence: Collection and Preservation |
2009 | •• |
170287 |
|
Brown C.L.T. |
Computer Evidence - Collection and Preservation |
2005 | •• |
110117 |
|
Fike C.T. |
Computer Evaluation of Mathematical Functions |
1968 | •• |
142962 |
|
Barger R.N. |
Computer Ethics: A Case-based Approach |
2008 | •• |
9720 |
|
Solomon C. |
Computer environments for children |
1986 | •• |
193991 |
|
Katz M., Levering R. |
Computer Entrepreneur |
1984 | •• |
181217 |
|
Wiak S., Krawczyk A., Trlep M. |
Computer Engineering in Applied Electromagnetism |
2005 | •• |
184348 |
|
Zhang J., Ding W., Liu H. |
Computer Engineering and Technology: 17th CCF Conference, NCCET 2013, Xining, China, July 20-22, 2013. Revised Selected Papers |
2013 | •• |
144051 |
|
Swartzlander E. |
Computer design development: Principal papers |
1976 | •• |
28820 |
|
Shiva S.G. |
Computer design and architecture |
2000 | •• |
153785 |
|
Antognetti P., Pederson D., Man H. |
Computer Design AIDS for Vlsi Circuits |
1981 | •• |
145770 |
|
Easttom C., Taylor D.J. |
Computer Crime, Investigation, and the Law |
2011 | •• |
137991 |
|
Somerson P. |
Computer Craziness |
1984 | •• |
136589 |
|
Astrem K., Wittenmark B. |
Computer Controlled Systems |
1996 | •• |
182770 |
|
Kletz T., Chung P., Broomfield E. |
Computer Control and Human Error |
1995 | •• |
111767 |
|
|
Computer Communications 23 1716-1723 Security policy conceptual modeling and formalization for networked information systems |
2000 | •• |
146416 |
|
Hoang D.B, Pye K.J. |
Computer Communication Networks |
n/a | •• |