Admin
دانلود کتاب | کتاب مرجع | کتاب انگلیسی | download free book | سری: ۶۲۰۲
نظر دهید ۳ آبان ۱۳۹۴

برای دانلود کتاب اینجا کلیک کنیدIdTitleAuthorDatePublisher1Vocabulary and Concepts of Organic ChemistryMilton Orchin, Roger S. Macomber, Allan R. Pinhas, R. Marshall Wilson2005Wiley-Interscience2Molecules of DeathR. H. Waring2007Imperial College Press3Side Reactions in Organic SynthesisF. Zaragoza Dörwald——4Organic Chemistry Laboratory Survival ManualJames W. Zubrick1987John Wiley & Sons Inc5Introduction to Machine Learning Ethem Alpaydin2004The MIT Press6Artificial Intelligence. Mirrors for the MindHarry Henderson2007Chelsea House Publications7Biologically Inspired Artificial Intelligence for Computer GamesDarryl Charles, Darryl Charles, Colin Fyfe, Daniel Livingstone, Stephen Mcglinchey2007IGI Publishing8Fundamentals of the New Artificial Intelligence: Neural, Evolutionary, Fuzzy and More Toshinori Munakata (auth.), Toshinori Munakata (eds.)2007Springer-Verlag London9Neural Networks – A Comprehensive Foundation, Second EditionSimon Haykin1998Prentice Hall10Artificial Intelligence. A Systems ApproachM. Tim Jones2008Jones and Bartlett Publishers, Inc11Elements of Artificial Intelligence: An Introduction Using LISP Steven L. Tanimoto1990Computer Science Press12Hiding in Plain Sight: Steganography and the Art of Covert CommunicationEric Cole2003Wiley13Contemporary CryptologyDario Catalano, Ronald Cramer, Ivan Damgard, Giovanni Di Crescenzo, David Pointcheval, Tsuyoshi Takagi2005Birkhäuser Basel14Digital Watermarking and SteganographyIngemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich, Ton Kalker2007Morgan Kaufmann15Cryptography and Network Security William Stallings2005Prentice Hall16Cryptography for DevelopersSimon Johnson——17Military CryptanalysisWilliam F. Friedman2009Cryptanalysis Reprint Publications18Guide to Elliptic Curve CryptographyDarrel Hankerson, Alfred J. Menezes, Scott Vanstone2004Springer19Internet Security. Cryptographic Principles, Algorithms, ProtocolsM. Rhee2003Wiley20Cryptography and Security Services. Mechanisms and ApplicationsManuel Mogollon2008CyberTech Publishing21Codes: The Guide to Secrecy From Ancient to Modern Times Richard A. Mollin2005Chapman and Hall/CRC22Cryptography and Data SecurityDorothy Elizabeth Robling Denning1982Addison-Wesley Pub (Sd)23Quantum Communications and CryptographyAlexander V. Sergienko2005CRC Press24The CodeBreakersDavid Kahn1996Scribner25The Mathematics of Ciphers. Number Theory and RSA Cr

مطالب مرتبط
دیدگاه ها بدون دیدگاه

دیدگاهی برای این مطلب ارسال نشده است.

پاسخ دهید

پاسخ دهید

نشانی ایمیل شما منتشر نخواهد شد.