计算机科学基础:从数据操纵到计算理论(影印版)

计算机科学基础:从数据操纵到计算理论(影印版)
分享
扫描下方二维码分享到微信
打开微信,点击右上角”+“,
使用”扫一扫“即可将网页分享到朋友圈。
2004-08
版次: 1
ISBN: 9787040155402
定价: 35.00
装帧: 平装
开本: 大16开
纸张: 胶版纸
页数: 384页
字数: 495千字
正文语种: 英语
362人买过
  • 《计算机科学基础:从数据操纵到计算理论》向读者介绍了计算机科学的诸多分支。主要内容包括文本、音频、图像与数据的数字化表示;计算机硬件与软件,如操作系统和程序设计语言;数据组织问题,如SQL数据库模型等。《计算机科学基础:从数据操纵到计算理论(影印版)》讲解循序渐进,从位和字节级别到较高的抽象级别,提供了使读者进一步学习程序设计和计算机学科其他分支领域所必备的基础知识。为确保书中内容清晰易懂,作者通过各种方式提供了指导:侧重讲解概念,而非仅限于数学模型和技术细节;为读者掌握内容展示大量图表,促进并支持阅读理解;有说明概念和相关数学模型的例题;辅助学习和复习的关键词条、小结和习题;完整章节分别讲述计算机网络、操作系统、计算机组成原理等。
    《计算机科学基础:从数据操纵到计算理论(影印版)》适用于高等院校理工科各专业本科计算机科学导论类课程,对于那些对计算机科学感兴趣的读者而言也有很好的参考价值。 PartⅠCOMPUTERANDDATA
    Chapter1Introduction
    1.1TheComputerasaBlackBox
    DataProcessor
    ProgrammableDataProcessor
    1.2vonNeumannModel
    FourSubsystems
    StoredProgramConcept
    SequentialExecutionofInstructions
    1.3ComputerHardware
    1.4Data
    StoringData
    OrganizingData
    1.5ComputerSoftware
    ProgramsMustBeStored
    ASequenceofInstructions
    Algorithms
    Languages
    SoftwareEngineering
    OperatingSystems
    1.6History
    MechanicalMachines(Before1930)
    BirthofElectronicComputers(1930—1950)
    1.7KeyTerms
    1.8Summary
    1.9PracticeSet

    Chapter2DataRepresentation
    2.1DataTypes
    2.2DataInsidetheComputer
    Bit
    BitPattern
    Byte
    2.3RepresentingData
    Text
    Numbers
    Images
    Audio
    Video
    2.4HexadecimalNotation
    Conversion
    2.5OctalNotation
    Conversion
    2.6KeyTerms
    2.7Summary
    2.8PracticeSet

    Chapter3NumberRepresentation
    3.1DecimalandBinary
    DecimalSystem
    BinarySystem
    3.2Conversion
    BinarytoDecimalConversion
    DecimaltoBinaryConversion
    3.3IntegerRepresentation
    UnsignedIntegersFormat
    Sign-and-MagnitudeFormat
    OnesComplementFormat
    TwosComplementFormat
    SummaryofIntegerRepresentation
    3.4ExcessSystem
    3.5Floating-PointRepresentation
    ConvertingtoBinary
    Normalization
    Sign,Exponent,andMantissa
    IEEEStandards
    3.6HexadecimalNotation
    3.7KeyTerms
    3.8Summary
    3.9PracticeSet

    Chapter4OperationsonBits
    4.1ArithmeticOperations
    ArithmeticOperationsonIntegers
    ArithmeticOperationsonFloating-PointNumbers
    4.2LogicalOperations
    TruthTables
    UnaryOperator
    BinaryOperators
    Applications
    4.3ShiftOperations
    4.4KeyTerms
    4.5Summary
    4.6PracticeSet

    PartⅡCOMPUTERHARDWARE
    Chapter5ComputerOrganization
    5.1CentralProcessingUnit(CPU)
    ArithmeticLogicUnit(ALU)
    Registers
    ControlUnit
    5.2MainMemory
    AddressSpace
    MemoryTypes
    MemoryHierarchy
    CacheMemory
    5.3Input/Output
    NonstorageDevices
    StorageDevices
    5.4SubsystemsInterconnection
    ConnectingCPUandMemory
    ConnectingI/ODevices
    AddressingInput/OutputDevices
    5.5ProgramExecution
    MachineCycle
    AMachineCycleExample
    Input/OutputOperation
    5.6TwoDifferentArchitectures
    CISC
    RISC
    5.7KeyTerms
    5.8Summary
    5.9PracticeSet

    Chapter6ComputerNetworks
    6.1Networks,LargeandSmall
    ModelandProtocol
    6.2OSIModel
    SevenLayers
    FunctionsoftheLayers
    6.3CategoriesofNetworks
    LocalAreaNetwork(LAN)
    MetropolitanAreaNetwork(MAN)
    WideAreaNetwork(WAN)
    6.4ConnectingDevices
    Repeaters
    Bridges
    Routers
    Gateways
    6.5TheInternetandTCP/IP
    PhysicalandData-LinkLayers
    NetworkLayer
    TransportLayer
    ApplicationLayer
    6.6KeyTerms
    6.7Summary
    6.8PracticeSet

    PartⅢCOMPUTERSOFTWARE
    Chapter7OperatingSystems
    7.1Definition
    7.2Evolution
    BatchSystems
    Time-SharingSystems
    PersonalSystems
    ParallelSystems
    DistributedSystems
    7.3Components
    MemoryManager
    ProcessManager
    DeviceManager
    FileManager
    UserInterface
    7.4PopularOperatingSystems
    Windows2000
    UNIX
    Linux
    7.5KeyTerms
    7.6Summary
    7.7PracticeSet

    Chapter8Algorithms
    8.1Concept
    InformalDefinition
    Example
    DefiningActions
    Refinement
    Generalization
    8.2ThreeConstructs
    Sequence
    Decision
    Repetition
    8.3AlgorithmRepresentation
    Flowchart
    Pseudocode
    8.4AMoreFormalDefinition
    OrderedSet
    UnambiguousSteps
    ProduceaResult
    TerminateinaFiniteTime
    8.5Subalgorithms
    StructureChart
    8.6BasicAlgorithms
    Summation
    Product
    SmallestandLargest
    Sorting
    Searching
    8.7Recursion
    IterativeDefinition
    RecursiveDefinition
    8.8KeyTerms
    8.9Summary
    8.10PracticeSet

    Chapter9ProgrammingLanguages
    9.1Evolution
    MachineLanguages
    SymbolicLanguages
    High-LevelLanguages
    NaturalLanguages
    9.2BuildingaProgram
    WritingandEditingPrograms
    CompilingPrograms
    LinkingPrograms
    9.3ProgramExecution
    9.4CategoriesofLanguages
    Procedural(Imperative)Languages
    Object-OrientedLanguages
    FunctionalLanguages
    Declarative(Logic)Languages
    SpecialLanguages
    9.5AProceduralLanguage:C
    Identifiers
    DataTypes
    Variables
    Constants
    InputandOutput
    Expressions
    Statements
    Functions
    Selection
    Repetition
    DerivedDataTypes
    Recursion
    9.6KeyTerms
    9.7Summary
    9.8PracticeSet

    Chapter10SoftwareEngineering
    10.1SoftwareLifeCycle
    AnalysisPhase
    DesignPhase
    ImplementationPhase
    TestingPhase
    10.2DevelopmentProcessModels
    WaterfallModel
    IncrementalModel
    10.3Modularity
    Tools
    Coupling
    Cohesion
    10.4Quality
    QualityDefined
    QualityFactors
    TheQualityCircle
    10.5Documentation
    UserDocumentation
    SystemDocumentation
    DocumentationasanOngoingProcess
    10.6KeyTerms
    10.7Summary
    10.8PracticeSet

    PartⅣDATAORGANIZATION
    Chapter11DataStructures
    11.1Arrays
    ArrayApplications
    Two-DimensionalArrays
    11.2Records
    AccessingRecords
    11.3LinkedLists
    Nodes
    PointerstoLinkedLists
    OperationsonLinkedLists
    11.4KeyTerms
    11.5Summary
    11.6PracticeSet

    Chapter12AbstractDataTypes
    12.1Background
    Definition
    ModelforanAbstractDataType
    OperationsonADTs
    12.2LinearLists
    OperationsonLinearLists
    ImplementationofaGeneralLinearList
    LinearListApplications
    12.3Stacks
    OperationsonStacks
    ImplementationofaStack
    StackApplications
    12.4Queues
    OperationsonQueues
    ImplementationofaQueue
    QueueApplications
    12.5Trees
    BasicTreeConcepts
    OperationsonTrees
    12.6BinaryTrees
    OperationsonBinaryTrees
    ImplementationofaBinaryTree
    BinaryTreeApplications
    12.7Graphs
    Terminology
    OperationsonGraphs
    ImplementationofaGraph
    GraphApplications
    12.8KeyTerms
    12.9Summary
    12.10PracticeSet

    Chapter13FileStructures
    13.1AccessMethods
    SequentialAccess
    RandomAccess
    13.2SequentialFiles
    UpdatingSequentialFiles
    13.3IndexedFiles
    InvertedFiles
    13.4HashedFiles
    HashingMethods
    Collision
    13.5TextversusBinary
    TextFiles
    BinaryFiles
    13.6KeyTerms
    13.7Summary
    13.8PracticeSet

    Chapter14Databases
    14.1DatabaseManagementSystem
    14.2Architecture
    InternalLevel
    ConceptualLevel
    ExternalLevel
    14.3DatabaseModels
    HierarchicalModel
    NetworkModel
    RelationalModel
    14.4RelationalModel
    Relation
    14.5OperationsonRelations
    Insert
    Delete
    Update
    Select
    Project
    Join
    Union
    Intersection
    Difference
    14.6StructuredQueryLanguage
    Statements
    14.7OtherDatabaseModels
    DistributedDatabases
    Object-OrientedDatabases
    14.8KeyTerms
    14.9Summary
    14.10PracticeSet
    PartVADVANCEDTOPICS

    Chapter15DataCompression
    15.1LosslessCompression
    Run-LengthEncoding
    HuffmanCoding
    LempelZivEncoding
    15.2LossyCompressionMethods
    ImageCompression:JPEG
    VideoCompression:MPEG
    15.3KeyTerms
    15.4Summary
    15.5PracticeSet

    Chapter16Security
    Privacy
    Authentication
    Integrity
    Nonrepudiation
    16.1Privacy
    Encryption/Decryption
    PrivacyUsingtheCombination
    16.2DigitalSignature
    SigningtheWholeDocument
    SigningtheDigest
    16.3KeyTerms
    16.4Summary
    16.5PracticeSet

    Chapter17TheoryofComputation
    17.1SimpleLanguage
    IncrementStatement
    DecrementStatement
    LoopStatement
    PoweroftheSimpleLanguage
    Conclusion
    17.2TuringMachine
    TuringMachineComponents
    SimulationofSimpleLanguage
    Conclusion
    17.3GodelNumbers
    RepresentingaProgram
    InterpretingaNumber
    17.4HaltingProblem
    HaltingProblemisnotSolvable
    17.5SolvableandUnsolvableProblems
    UnsolvableProblems
    SolvableProblems
    17.6KeyTerms
    17.7Summary
    17.8PracticeSet
    AppendixAASCIICode
    AppendixBUnicode
    AppendixCFlowcharts
    C.1AuxiliarySymbols
    C.2MainSymbols
    AppendixDPseudocode
    D.1Components
    AppendixEStructureCharts
    E.1StructureChartSymbols
    E.2ReadingStructureCharts
    E.3RulesofStructureCharts
    AppendixFDiscreteCosineTransform
    F.1DiscreteCosineTransform
    F.2InverseTransform
    AppendixGAcronyms
  • 内容简介:
    《计算机科学基础:从数据操纵到计算理论》向读者介绍了计算机科学的诸多分支。主要内容包括文本、音频、图像与数据的数字化表示;计算机硬件与软件,如操作系统和程序设计语言;数据组织问题,如SQL数据库模型等。《计算机科学基础:从数据操纵到计算理论(影印版)》讲解循序渐进,从位和字节级别到较高的抽象级别,提供了使读者进一步学习程序设计和计算机学科其他分支领域所必备的基础知识。为确保书中内容清晰易懂,作者通过各种方式提供了指导:侧重讲解概念,而非仅限于数学模型和技术细节;为读者掌握内容展示大量图表,促进并支持阅读理解;有说明概念和相关数学模型的例题;辅助学习和复习的关键词条、小结和习题;完整章节分别讲述计算机网络、操作系统、计算机组成原理等。
    《计算机科学基础:从数据操纵到计算理论(影印版)》适用于高等院校理工科各专业本科计算机科学导论类课程,对于那些对计算机科学感兴趣的读者而言也有很好的参考价值。
  • 目录:
    PartⅠCOMPUTERANDDATA
    Chapter1Introduction
    1.1TheComputerasaBlackBox
    DataProcessor
    ProgrammableDataProcessor
    1.2vonNeumannModel
    FourSubsystems
    StoredProgramConcept
    SequentialExecutionofInstructions
    1.3ComputerHardware
    1.4Data
    StoringData
    OrganizingData
    1.5ComputerSoftware
    ProgramsMustBeStored
    ASequenceofInstructions
    Algorithms
    Languages
    SoftwareEngineering
    OperatingSystems
    1.6History
    MechanicalMachines(Before1930)
    BirthofElectronicComputers(1930—1950)
    1.7KeyTerms
    1.8Summary
    1.9PracticeSet

    Chapter2DataRepresentation
    2.1DataTypes
    2.2DataInsidetheComputer
    Bit
    BitPattern
    Byte
    2.3RepresentingData
    Text
    Numbers
    Images
    Audio
    Video
    2.4HexadecimalNotation
    Conversion
    2.5OctalNotation
    Conversion
    2.6KeyTerms
    2.7Summary
    2.8PracticeSet

    Chapter3NumberRepresentation
    3.1DecimalandBinary
    DecimalSystem
    BinarySystem
    3.2Conversion
    BinarytoDecimalConversion
    DecimaltoBinaryConversion
    3.3IntegerRepresentation
    UnsignedIntegersFormat
    Sign-and-MagnitudeFormat
    OnesComplementFormat
    TwosComplementFormat
    SummaryofIntegerRepresentation
    3.4ExcessSystem
    3.5Floating-PointRepresentation
    ConvertingtoBinary
    Normalization
    Sign,Exponent,andMantissa
    IEEEStandards
    3.6HexadecimalNotation
    3.7KeyTerms
    3.8Summary
    3.9PracticeSet

    Chapter4OperationsonBits
    4.1ArithmeticOperations
    ArithmeticOperationsonIntegers
    ArithmeticOperationsonFloating-PointNumbers
    4.2LogicalOperations
    TruthTables
    UnaryOperator
    BinaryOperators
    Applications
    4.3ShiftOperations
    4.4KeyTerms
    4.5Summary
    4.6PracticeSet

    PartⅡCOMPUTERHARDWARE
    Chapter5ComputerOrganization
    5.1CentralProcessingUnit(CPU)
    ArithmeticLogicUnit(ALU)
    Registers
    ControlUnit
    5.2MainMemory
    AddressSpace
    MemoryTypes
    MemoryHierarchy
    CacheMemory
    5.3Input/Output
    NonstorageDevices
    StorageDevices
    5.4SubsystemsInterconnection
    ConnectingCPUandMemory
    ConnectingI/ODevices
    AddressingInput/OutputDevices
    5.5ProgramExecution
    MachineCycle
    AMachineCycleExample
    Input/OutputOperation
    5.6TwoDifferentArchitectures
    CISC
    RISC
    5.7KeyTerms
    5.8Summary
    5.9PracticeSet

    Chapter6ComputerNetworks
    6.1Networks,LargeandSmall
    ModelandProtocol
    6.2OSIModel
    SevenLayers
    FunctionsoftheLayers
    6.3CategoriesofNetworks
    LocalAreaNetwork(LAN)
    MetropolitanAreaNetwork(MAN)
    WideAreaNetwork(WAN)
    6.4ConnectingDevices
    Repeaters
    Bridges
    Routers
    Gateways
    6.5TheInternetandTCP/IP
    PhysicalandData-LinkLayers
    NetworkLayer
    TransportLayer
    ApplicationLayer
    6.6KeyTerms
    6.7Summary
    6.8PracticeSet

    PartⅢCOMPUTERSOFTWARE
    Chapter7OperatingSystems
    7.1Definition
    7.2Evolution
    BatchSystems
    Time-SharingSystems
    PersonalSystems
    ParallelSystems
    DistributedSystems
    7.3Components
    MemoryManager
    ProcessManager
    DeviceManager
    FileManager
    UserInterface
    7.4PopularOperatingSystems
    Windows2000
    UNIX
    Linux
    7.5KeyTerms
    7.6Summary
    7.7PracticeSet

    Chapter8Algorithms
    8.1Concept
    InformalDefinition
    Example
    DefiningActions
    Refinement
    Generalization
    8.2ThreeConstructs
    Sequence
    Decision
    Repetition
    8.3AlgorithmRepresentation
    Flowchart
    Pseudocode
    8.4AMoreFormalDefinition
    OrderedSet
    UnambiguousSteps
    ProduceaResult
    TerminateinaFiniteTime
    8.5Subalgorithms
    StructureChart
    8.6BasicAlgorithms
    Summation
    Product
    SmallestandLargest
    Sorting
    Searching
    8.7Recursion
    IterativeDefinition
    RecursiveDefinition
    8.8KeyTerms
    8.9Summary
    8.10PracticeSet

    Chapter9ProgrammingLanguages
    9.1Evolution
    MachineLanguages
    SymbolicLanguages
    High-LevelLanguages
    NaturalLanguages
    9.2BuildingaProgram
    WritingandEditingPrograms
    CompilingPrograms
    LinkingPrograms
    9.3ProgramExecution
    9.4CategoriesofLanguages
    Procedural(Imperative)Languages
    Object-OrientedLanguages
    FunctionalLanguages
    Declarative(Logic)Languages
    SpecialLanguages
    9.5AProceduralLanguage:C
    Identifiers
    DataTypes
    Variables
    Constants
    InputandOutput
    Expressions
    Statements
    Functions
    Selection
    Repetition
    DerivedDataTypes
    Recursion
    9.6KeyTerms
    9.7Summary
    9.8PracticeSet

    Chapter10SoftwareEngineering
    10.1SoftwareLifeCycle
    AnalysisPhase
    DesignPhase
    ImplementationPhase
    TestingPhase
    10.2DevelopmentProcessModels
    WaterfallModel
    IncrementalModel
    10.3Modularity
    Tools
    Coupling
    Cohesion
    10.4Quality
    QualityDefined
    QualityFactors
    TheQualityCircle
    10.5Documentation
    UserDocumentation
    SystemDocumentation
    DocumentationasanOngoingProcess
    10.6KeyTerms
    10.7Summary
    10.8PracticeSet

    PartⅣDATAORGANIZATION
    Chapter11DataStructures
    11.1Arrays
    ArrayApplications
    Two-DimensionalArrays
    11.2Records
    AccessingRecords
    11.3LinkedLists
    Nodes
    PointerstoLinkedLists
    OperationsonLinkedLists
    11.4KeyTerms
    11.5Summary
    11.6PracticeSet

    Chapter12AbstractDataTypes
    12.1Background
    Definition
    ModelforanAbstractDataType
    OperationsonADTs
    12.2LinearLists
    OperationsonLinearLists
    ImplementationofaGeneralLinearList
    LinearListApplications
    12.3Stacks
    OperationsonStacks
    ImplementationofaStack
    StackApplications
    12.4Queues
    OperationsonQueues
    ImplementationofaQueue
    QueueApplications
    12.5Trees
    BasicTreeConcepts
    OperationsonTrees
    12.6BinaryTrees
    OperationsonBinaryTrees
    ImplementationofaBinaryTree
    BinaryTreeApplications
    12.7Graphs
    Terminology
    OperationsonGraphs
    ImplementationofaGraph
    GraphApplications
    12.8KeyTerms
    12.9Summary
    12.10PracticeSet

    Chapter13FileStructures
    13.1AccessMethods
    SequentialAccess
    RandomAccess
    13.2SequentialFiles
    UpdatingSequentialFiles
    13.3IndexedFiles
    InvertedFiles
    13.4HashedFiles
    HashingMethods
    Collision
    13.5TextversusBinary
    TextFiles
    BinaryFiles
    13.6KeyTerms
    13.7Summary
    13.8PracticeSet

    Chapter14Databases
    14.1DatabaseManagementSystem
    14.2Architecture
    InternalLevel
    ConceptualLevel
    ExternalLevel
    14.3DatabaseModels
    HierarchicalModel
    NetworkModel
    RelationalModel
    14.4RelationalModel
    Relation
    14.5OperationsonRelations
    Insert
    Delete
    Update
    Select
    Project
    Join
    Union
    Intersection
    Difference
    14.6StructuredQueryLanguage
    Statements
    14.7OtherDatabaseModels
    DistributedDatabases
    Object-OrientedDatabases
    14.8KeyTerms
    14.9Summary
    14.10PracticeSet
    PartVADVANCEDTOPICS

    Chapter15DataCompression
    15.1LosslessCompression
    Run-LengthEncoding
    HuffmanCoding
    LempelZivEncoding
    15.2LossyCompressionMethods
    ImageCompression:JPEG
    VideoCompression:MPEG
    15.3KeyTerms
    15.4Summary
    15.5PracticeSet

    Chapter16Security
    Privacy
    Authentication
    Integrity
    Nonrepudiation
    16.1Privacy
    Encryption/Decryption
    PrivacyUsingtheCombination
    16.2DigitalSignature
    SigningtheWholeDocument
    SigningtheDigest
    16.3KeyTerms
    16.4Summary
    16.5PracticeSet

    Chapter17TheoryofComputation
    17.1SimpleLanguage
    IncrementStatement
    DecrementStatement
    LoopStatement
    PoweroftheSimpleLanguage
    Conclusion
    17.2TuringMachine
    TuringMachineComponents
    SimulationofSimpleLanguage
    Conclusion
    17.3GodelNumbers
    RepresentingaProgram
    InterpretingaNumber
    17.4HaltingProblem
    HaltingProblemisnotSolvable
    17.5SolvableandUnsolvableProblems
    UnsolvableProblems
    SolvableProblems
    17.6KeyTerms
    17.7Summary
    17.8PracticeSet
    AppendixAASCIICode
    AppendixBUnicode
    AppendixCFlowcharts
    C.1AuxiliarySymbols
    C.2MainSymbols
    AppendixDPseudocode
    D.1Components
    AppendixEStructureCharts
    E.1StructureChartSymbols
    E.2ReadingStructureCharts
    E.3RulesofStructureCharts
    AppendixFDiscreteCosineTransform
    F.1DiscreteCosineTransform
    F.2InverseTransform
    AppendixGAcronyms
查看详情
系列丛书 / 更多
计算机科学基础:从数据操纵到计算理论(影印版)
管理信息系统:网络化企业的组织与技术(第6版)(影印版)
劳德 著
计算机科学基础:从数据操纵到计算理论(影印版)
软件工程 理论与实践(第4版影印版)
[美]弗莱格、[美]阿特利 著
计算机科学基础:从数据操纵到计算理论(影印版)
管理信息系统:管理数字化公司(第9版)(影印版)
[美]Kenneth、Jane P.Laudon 著
计算机科学基础:从数据操纵到计算理论(影印版)
信息技术与应用导论(第7版影印版)
哈奇森 著
计算机科学基础:从数据操纵到计算理论(影印版)
系统分析与设计方法(第5版)(影印版)
[美]惠滕 著
计算机科学基础:从数据操纵到计算理论(影印版)
操作系统概念——Java 实现(第七版)
Abraham、Silberschatz、Peter、Bear、Galvin 著;郑扣根 译
计算机科学基础:从数据操纵到计算理论(影印版)
软件工程:理论与实践
[美]弗莱格(Pfleeger S.L.) 著
计算机科学基础:从数据操纵到计算理论(影印版)
交互式计算机图形学
安杰尔 著
计算机科学基础:从数据操纵到计算理论(影印版)
网络管理:原理与实践(影印版)
[美]苏布拉马尼亚(Subramanian M.) 著
计算机科学基础:从数据操纵到计算理论(影印版)
系统分析与设计简明教程(影印版)
[美]乔治 著
计算机科学基础:从数据操纵到计算理论(影印版)
电子电路基础(第2版)(影印版)
[美]汉布利 著
计算机科学基础:从数据操纵到计算理论(影印版)
语义万维网·工程实践指南(第2版 翻译版)/国外优秀信息科学与技术系列教学用书
[美]Dean、Jim Hendler 著;张自力、李莉 编
相关图书 / 更多
计算机科学基础:从数据操纵到计算理论(影印版)
计算机基础与实训教程
顾玲芳 编
计算机科学基础:从数据操纵到计算理论(影印版)
计算机网络攻击与防护
刘念;陈雪松;谈洪磊
计算机科学基础:从数据操纵到计算理论(影印版)
计算机组成原理与汇编语言
田民格、秦彩杰、林观俊、田佳琪
计算机科学基础:从数据操纵到计算理论(影印版)
计算机网络技术(第5版)
徐立新 吕书波
计算机科学基础:从数据操纵到计算理论(影印版)
计算天文
冯毅
计算机科学基础:从数据操纵到计算理论(影印版)
计算思维培养与无人机创意编程
范谊 陈宇 张锦东
计算机科学基础:从数据操纵到计算理论(影印版)
计算机组成原理与系统结构(第3版)
冯建文 章复嘉 赵建勇 包健 编著
计算机科学基础:从数据操纵到计算理论(影印版)
计算小状元 小学数学 2年级上册 bs版 小学数学单元测试 新华
作者
计算机科学基础:从数据操纵到计算理论(影印版)
计算机应用基础
苗苗
计算机科学基础:从数据操纵到计算理论(影印版)
计算机系统原理(2023年版) 全国高等教育自学考试指导委员会
全国高等教育自学考试指导委员会
计算机科学基础:从数据操纵到计算理论(影印版)
计算机辅助翻译教程()
赵秋荣
计算机科学基础:从数据操纵到计算理论(影印版)
计算机三维建模方法
易健宏 编著;李凤仙
您可能感兴趣 / 更多
计算机科学基础:从数据操纵到计算理论(影印版)
计算机科学导论(原书第4版)
Behrouz A.Forouzan
计算机科学基础:从数据操纵到计算理论(影印版)
模拟CMOS集成电路设计(第2版)(电子信息前沿技术丛书)
Behzad、Razavi、池保勇 著
计算机科学基础:从数据操纵到计算理论(影印版)
光通信集成电路设计(第二版)
Behzad Razavi 作者;林云 译者
计算机科学基础:从数据操纵到计算理论(影印版)
OperationsAndProductionSystemsWithMultipleObjectives
Behnam Malakooti 著
计算机科学基础:从数据操纵到计算理论(影印版)
A Companion to Comparative Literature
Behdad;Thomas;Ali;Dominic
计算机科学基础:从数据操纵到计算理论(影印版)
Tabrizi Rapid Transformation 大不里士的转变
Behnam N. Tabrizi 著
计算机科学基础:从数据操纵到计算理论(影印版)
BecomingaReal-TimeEnterprise:HarnessingthePowerofRTEtoMaximizeCompetitiveAdvantage
Behnam Tabrizi 著
计算机科学基础:从数据操纵到计算理论(影印版)
数据通信与网络
Behrouz A.Forouzan;王嘉祯
计算机科学基础:从数据操纵到计算理论(影印版)
数据通信与网络技术(第2版)
Behrouz A.Forouzan 著
计算机科学基础:从数据操纵到计算理论(影印版)
Design of Analog CMOS Integrated Circuits
Behzad Razavi
计算机科学基础:从数据操纵到计算理论(影印版)
Introduction to Computer Science:A Structured Programming Approach with C
Behrouz A. Forouzan;Richard F. Gilberg
计算机科学基础:从数据操纵到计算理论(影印版)
MonolithicPhase-LockedLoopsandClockRecoveryCircuits:TheoryandDesign
Behzad Razavi 编