Produktart
Zustand
Einband
Weitere Eigenschaften
Gratisversand
Land des Verkäufers
Verkäuferbewertung
Verlag: Northwestern Polytechnical University Press; 1 edition (January 1. 2004), 2000
ISBN 10: 7561217692ISBN 13: 9787561217696
Anbieter: liu xing, Nanjing JiangSu, JS, China
Buch
paperback. Zustand: New. Paperback Pages Number: 447 Language: Simplified Chinese Publisher: Northwestern University Press; 1 (January 1. 2004). Novice learn the optional installation computer maintenance think alike. mainly in a certain computer operating basis readers for the object. the system computer parts. the preferred method of computer parts. computer hardware and software installation and configuration skills. computer system maintenance. etc. Contents: Chapter 1 easily. then the Zanji 1.1 Zanji benefits a.
Verlag: Northwestern Polytechnical University Press; 1 edition (January 1. 2004), 2000
ISBN 10: 7561217560ISBN 13: 9787561217566
Anbieter: liu xing, Nanjing JiangSu, JS, China
Buch
paperback. Zustand: New. Paperback Pages Number: 585 Language: Simplified Chinese. English. Publisher: Northwestern University Press; 1 edition (January 1. 2004). Mankind has entered the 21st century. high-tech era of challenging students English proficiency of a higher demand. the enthusiasm of the students to learn English and more high. Editor according to the latest College English syllabus glossary. and he has long been engaged in the practice of college English teaching. from solving the practical problems of t.
Verlag: Northwestern Polytechnical University Press; 1 edition (January 1. 2004), 2000
ISBN 10: 7561215991ISBN 13: 9787561215999
Anbieter: liu xing, Nanjing JiangSu, JS, China
Buch
paperback. Zustand: New. Paperback. Pub Date: 2004 Pages: 356 Language: Chinese in Publisher: Northwestern University Press. National Defense Eleventh Five-Year Planning: Network and Information Security from the combination of theory and practice perspective. systematic introduction to the basic theory and application of network and information security technologies. The book is divided into upper. middle and lower three of 11 chapters. Part I presents the foundation of network and information security. including In.