電子書書目整合查詢結果

總筆數:308

 
書名作者出版年查看回報錯誤連結
Beginning spatial with SQL server 2008 Alastair Aitchison. 2009 查看
回報問題連結
SQL Server 2008 query performance tuning distilled Grant Fritchey, Sajal Dam. 2009 查看
回報問題連結
Pro SQL Server 2008 replication Sujoy Paul. 2009 查看
回報問題連結
Pro SQL server 2008 administration Ken Simmons, Sylvester Carstarphen. 2009 查看
回報問題連結
Foundation Fireworks CS4 Grant Hinkson ... [et al.]. 2009 查看
回報問題連結
Locally decodable codes and private information retrieval schemes Sergey Yekhanin. 2010 查看
回報問題連結
Troubleshooting Oracle Performance Christian Antognini. 2008 查看
回報問題連結
Learn C on the Mac:a complete course in C programming for the beginner / Dave Mark. 2009 查看
回報問題連結
Pro Javascript Ria Techniques:best practices, performance and presentation / Den Odell. 2009 查看
回報問題連結
The definitive guide to Plone Maurizio Delmonte ... [et al.]. 2009 查看
回報問題連結
Beginning SQL Queries:From Novice to Professional / Clare Churcher. 2008 查看
回報問題連結
AdvancED Flex 4 Shashank Tiwari, Elad Elrom. 2010 查看
回報問題連結
Tutorials on the foundations of cryptography:dedicated to Oded Goldreich / Yehuda Lindell. 2017 查看
回報問題連結
Data Science Analytics and Applications:First International Conference, DaSAA 2017, Chennai, India, January 4-6, 2017 : revised selected papers / Shriram R, Mak Sharma. 2018 查看
回報問題連結
Pro SQL Server 2008 XML Michael Coles. 2008 查看
回報問題連結
SQL server 2008 transact-SQL recipes Joseph Sack. 2008 查看
回報問題連結
AdvancED Flex 3 Shashank Tiwari ... [et al.]. 2008 查看
回報問題連結
The essential guide to Flash CS4 AIR development Marco Casario. 2009 查看
回報問題連結
Apache HBase primer Deepak Vohra. 2016 查看
回報問題連結
Towards hardware-intrinsic security:foundations and practice / Ahmad-Reza Sadeghi, David Naccache ; foreword by Pim Tuyls. 2010 查看
回報問題連結
Timing channels in cryptography ::a micro-architectural perspective / Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya. 查看
回報問題連結
Expert Oracle database 11g administration Sam R. Alapati. 2009 查看
回報問題連結
Pro full-text search in SQL server 2008 Michael Coles. 2009 查看
回報問題連結
The block cipher companion Lars R. Knudsen, Matthew J.B. Robshaw. 2011 查看
回報問題連結
Fault analysis in cryptography Marc Joye, Michael Tunstall. 2012 查看
回報問題連結
Proceedings of International Ethical Hacking Conference 2018 :eHaCON 2018, Kolkata, India / Mohuya Chakraborty, Satyajit Chakrabarti, Valentina Emilia Balas, J. K. Mandal. 查看
回報問題連結
Policies and research in identity management:Second IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19, 2010, proceedings / Elisabeth de Leeuw, Simone Fischer-Hubner, Lothar Fritsch. 2010 查看
回報問題連結
Efficient secure two-party protocols:techniques and constructions / Carmit Hazay, Yehuda Lindell. 2010 查看
回報問題連結
Information Theory and Network Coding Raymond W. Yeung. 2008 查看
回報問題連結
Computer network security:theory and practice / Jie Wang. 2009 查看
回報問題連結
AdvancED CSS Joseph R. Lewis, Meitar Moscovitz. 2009 查看
回報問題連結
上一頁 第2頁/共21頁/跳至 下一頁