Search ResultsElectronic Resources
Limit Search Results
Author
Language
Subject
Library
1564 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Slaughter, Sandra A., author.
      Format: 
      Excerpt: 
      competitive and has undergone a dramatic transformation from its roots in a handful of computer hardware
      by 
      Pal, Sankar K.
      Format: 
      Excerpt: 
      surveillance is an extremely interdisciplinary area, embracing the study of methods and algorithms for computer
      by 
      Grace, David, 1970-
      Format: 
      Excerpt: 
      communications techniques in different application areas (e.g. Cognitive Femtocell Networks (CFN)) Written by
      by 
      Serpanos, Dimitrios Nikolaou.
      Format: 
      Excerpt: 
      VLSI. Discussing the major challenges in the design of networks and the architectures that have been
      by 
      International Congress of Energy and Environment Engineering and Management (3rd : 2009 : Portalegre, Portugal)
      Format: 
      Excerpt: 
      pumps operating as turbines for energy recovery in water distribution networks. Two case study -- Leds
      by 
      Soliman, S. A.
      Format: 
      Excerpt: 
      advantages and disadvantages and when they are best utilized. Supported by an online computer program, this
      by 
      Casey, Eoghan.
      Format: 
      Excerpt: 
      cellular telephones and other mobile devices), and investigations involving networks (including enterprise
      by 
      Saltzer, J. H., 1939-
      Format: 
      Excerpt: 
      organization, file systems, data integrity, consistency, and authenticated messages. Most computer systems are
      by 
      Krasnogor, Natalio.
      MacEwan University Access (Unlimited Concurrent Users) from ScienceDirect
      ScienceDirect http://www.sciencedirect.com/science/book/9780444528650
      Format: 
      Excerpt: 
      -Assembled Computer Architectures -- Ch. 9: Simulation of Self-Assembly Processes Using Abstract Reduction Systems
      by 
      Zelkowitz, Marvin V., 1945-
      Format: 
      Excerpt: 
      and Applications; 3. Multimedia Security; 6. Computer Forensics; 8. Security Protocols for Wireless
      by 
      Berndt, Ernst R.
      Format: 
      Excerpt: 
      -- Computer input, computer networks, and productivity / B. K. Atrostic and Sang Nguyen -- Services
      by 
      Kraut, Robert E.
      Format: 
      Excerpt: 
      / Robert Kraut ... [et al.] -- The neutered computer / Malcom Brynin -- The consumption junction revisited