PDF
دانلود رایگان کتاب زبان تخصصی فناوری اطلاعات-مادسیجhttps://madsg.com/.../zaban-takhasosi-ITmadsg.com_.pdf۱۳۹۸/۹/۱۸ -
Standards for Security Program Components III. Standards for Digital Government (Internet) Applications Interim Addendum The requirements contained in the...
PDF
(Handbook of Terminology-انجمن مترجمان ایرانhttp://www.itia.ir/documents/ha.pdf۱۳۹۶/۱۰/۱۲ -
which the concept belongs, the languages dealt with, the terms, their usage labels and their textual supports. The development of data banks and the Internet has fa...
PDF
-پژوهش های علمی صنعتیhttp://security.irost.org/.../Hack Proofing - Your Network - In...۱۳۹۴/۵/۳۰ -
holes, frequently in InternetExplorer. In 1997, he created the first buffer overflow exploits for AIX. Some of his most visible work has included numerous exploits that...
PDF
Using Technology in Teaching Using Technology in...http://kishaway.com/.../Using-Technology-in-Teaching.pdf۱۳۹۷/۶/۱۸ -
often something on the Internet. Hyper- text is almost always underlined and in a dif- ferent color from the rest of the text. When you click on a hypertext word or phrase,...
PDF
-بانک مقاله علمیhttp://gigapaper.ir/.../The JavaScript Anthology - 101 Essentia...۱۳۹۵/۱۱/۲۹ -
... xi 1. Getting Started with JavaScript...
PDF
دانلود فایل : endnote.pdf-دانشگاه علوم پزشکی شهید بهشتیhttp://www.sbmu.ac.ir/uploads/endnote_343010.pdf۱۳۹۷/۲/۲۹ -
هدنوش زاب یوشکزاSend to تمس رد:تسار باختناCitation Manager یور رب کیلکCreate File InternetExplorer: دنوش یم لقتنم اهدروکر و زاب راکدوخ روط هب توندنا Firefox:
PDF
دریافت فایلhttp://10.30.68.22/Docs/2010300011029.pdf۱۳۹۶/۷/۱۱ -
FURTHER, READERS SHOULD BE AWARE THAT INTERNET WEBSITES LISTED IN THIS WORK MAY HAVE CHANGED OR DISAPPEARED BETWEEN WHEN THIS WORK WAS WRIT- TEN AND WHEN IT IS...