-
Structured programming in dBase IV /
-
Programmer's quick refence series : dBASE IV /
-
Using dBase II /
-
Advanced techniques in dBase II /
-
Using application software in business : using the IBM PC, VP-Planner Plus, dBASE III Plus, WordPerfect 4.2 /
-
DOS 5.0, WordPerfect 5.1, Lotus 1-2-3 (2.2 and 2.3), dBase IV /
-
Computers and information processing : the complete course /
-
Microcomputer systems : management and applications /
-
Programming with dBase III Plus /
-
Computers--concepts, implications, and applications with DOS 5.0, WordPerfect 5.1, Lotus 1-2-3, Release 2.4, and dBASE IV 1.5 /
-
Application software : version A, WordPerfect 5.1, DOS Version 2.x-5.x, Lotus 1-2-3 Releases 1A-2.4, dBase III Plus /
-
Making sense of data III a practical guide to designing interactive data visualizations /
-
Computer organization and design : the hardware/software interface /
-
Computer organization and design : the hardware/software interface /
-
Hardware and computer organization the software perspective /
-
Computer organization and design : the hardware/software interface /
-
Computer organization and design : the hardware/software interface.
-
A networking approach to grid computing
-
Stealing the network how to own a continent /
-
Grid computing with the IBM Grid Toolbox
-
Grid computing for developers
-
Charts for prediction and chance dazzling diagrams on your PC /
-
BPEL PM and OSB operational management with Oracle Enterprise Manager 10g grid control manage the operational tasks for multiple BPEL and OSB environments centrally /
-
Software piracy exposed
-
Security assessment case studies for implementing the NSA lAM /
-
Role-based access control
-
Physical computing sensing and controlling the physical world with computers /
-
Metrics for software conceptual models
-
Identity and access management solutions using WebSphere Portal V5.1, Tivoli Identity Manager V4.5.1, and Tivoli Access Manager V5.1 /
-
Cyborgs@cyberspace? an ethnographer looks to the future /
-
EU Digital Copyright Law and the End-User
-
Internet of Things Legal Perspectives /
-
Cybercrimes: A Multidisciplinary Analysis
-
The Global Cybercrime Industry Economic, Institutional and Strategic Perspectives /
-
Text entry systems mobility, accessibility, universality /
-
Quantum information V proceedings of the fifth international conference, Meijo University, Japan, 17-19 December 2001 /
-
Role-based access control
-
God and the chip religion and the culture of technology /
-
Essential computer security everyone's guide to e-mail, internet, and wireless security /
-
Calculating a natural world scientists, engineers, and computers during the rise of U.S. cold war research /
-
Linux firewalls attack detection and response with iptables, psad, and fwsnort /
-
Handbook of usability testing how to plan, design, and conduct effective tests /
-
Programming for the absolute beginner
-
Proceedings of the 10th Italian Conference on Theoretical Computer Science, ICTS'07 Rome, Italy, 3-5 October 2007 /
-
New directions in neural networks 18th Italian Workshop on Neural Networks: WIRN 2008 /
-
ICTACS 2006 the First International Conference on Theories and Applications of Computer Science 2006 : Ho Chi Minh City, Vietnam, 3-5 August 2006 /
-
Access denied the practice and policy of global Internet filtering /
-
A history of modern computing