1
by Horstmann, Cay S.
Published 2013
Subjects: ...Java (Computer program language)....
Cover image
Book
2
Published 2013
Table of Contents: ...-specific Characteristics -- The Application of Information Security on the Computer Terminals of 3rd...
View full text
Electronic eBook
3
by Spear, Chris., Spear, Chris.
Published 2008
Table of Contents: ...1. Verification Guidelines -- 1.1 The Verification Process -- 1.2 The Verification Methodology...
View full text
Electronic eBook