COMPUTERS -- Programming -- Software Development & Engineering. : Laravel application development cookbook : over 90 recipes to learn all the key aspects of Laravel, including installation, authentication, testing, and the deployment and integration of third parties in your application / Terry Matula
Here are entered general works on protecting computer hardware and software from accidental or malicious access, use, modification, disclosure, or destruction --subdivision Security measures under names of individual computers, networks, and systems, e.g. IBM computers--Security measures
Computers -- Purchasing -- United States : Rapid acquisition and fielding for information assurance and cyber security in the Navy / Isaac R. Porche III, Shawn McKay, Megan McKernan, Robert W. Button, Bob Murphy, Kate Giglio, Elliot Axelband
2012
1
Computers -- Recycling : A holistic view of software and hardware reuse : dependable reuse of components and systems / Fevzi Belli, Ferdinand Quella
Computers -- Research -- United States : The national challenge in computer science and technology / Computer Science and Technology Board, Commission on Physical Sciences, Mathematics, and Resources, National Research Council
Computers whose input, output and state transitions are carried out by biochemical interactions and reactions
1
COMPUTERS : Thinking Machines : the Quest for Artificial Intelligence--and Where It's Taking Us Next / Dormehl, Luke
2017
1
COMPUTERS S -- Security -- Networking. : Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering both identity and certificate management / Kent Nordström
2012
1
COMPUTERS S -- Security -- Online Safety & Privacy. : Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering both identity and certificate management / Kent Nordström
Here are entered general works on protecting computer hardware and software from accidental or malicious access, use, modification, disclosure, or destruction --subdivision Security measures under names of individual computers, networks, and systems, e.g. IBM computers--Security measures