Search ResultsElectronic Resources
Limit Search Results
Material Type
Language
Subject
Library
14 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Murdick, Robert G.
      Format: 
      Excerpt: 
      Information systems for modern management / Murdick, Robert G.
      by 
      Aktaş, Ziya A.
      Format: 
      Excerpt: 
      Structured analysis and design of information systems / Aktaş, Ziya A.
      by 
      Aktaş, Ziya A.
      Format: 
      Excerpt: 
      Structured analysis and design of information systems / Aktaş, Ziya A.
      Format: 
      Excerpt: 
      Management information systems.
      by 
      Gökay, Gül
      Format: 
      Excerpt: 
      Management information systems -- Dissertations, academic -- Turkey.
      by 
      Niku-Lari, A.
      Format: 
      Excerpt: 
      practical guidebook on structural analysis systems and their applications. It provides detailed information
      by 
      Wolf, Emil.
      Format: 
      Excerpt: 
      . Numerical Techniques and Sampling Criteria; References; Chapter V. INFORMATION PROCESSING WITH SPATIALLY
      by 
      Wang, Pingyang.
      Format: 
      Excerpt: 
      , optimum generation scheduling and power system control centers. The compilation of this information in one
      by 
      MacGregor, Ronald J.
      Format: 
      Excerpt: 
      NeuronalSystems and Networks""; ""Chapter 5. ""Simpler Systems"" and Invertebrate Systems""; ""Experimentally
      by 
      Jubb, K. V. F.
      Format: 
      Excerpt: 
      information on bones, joints, and synovial structures and diseases of joints, including adaptational
      by 
      Park, Kyung S. (Kyung Soo)
      Format: 
      Excerpt: 
      ; 4.2 MAN-MACHINE SYSTEMS DESIGN; 4.3 HUMAN AS SENSOR; 4.4 HUMAN AS INFORMATION PROCESSOR; 4.5 HUMAN
      by 
      Carroll, John M. (John Millar), 1925-
      Format: 
      Excerpt: 
      prevention of attacks on computer systems and data being compromised. The book is divided into five parts