4
|
|
Computers Access control -- See Also the narrower term Software protection Here are entered works on various techniques used to protect software against unauthorized use or duplication.
|
|
1
|
7
|
|
Computers -- Access control -- Case studies. : Norman, Adrian R. D.
|
1983
|
1
|
8
|
|
Computers -- Access control -- China. : Jiang, Ying.
|
2012
|
1
|
11
|
|
Computers -- Access control -- Standards. : Dent, Alexander W.
|
2004
|
1
|
12
|
|
Computers -- Access control -- Testing. : Ali, Shakeel.
|
2011
|
1
|
16
|
|
Computers and children -- European Union countries. : Lievens, Eva,
|
2010
|
1
|
24
|
|
|
|
1
|
26
|
|
|
|
1
|
30
|
|
Computers and literacy -- Québec (Province) : Blais, Hélène,
|
1988
|
1
|
31
|
|
Computers and literacy -- Social aspects. : Tuman, Myron C.,
|
1992
|
1
|
34
|
|
|
|
1
|
39
|
|
|
|
1
|
45
|
|
Computers -- Audio-visual aids. : Shelly, Gary B.
|
1980
|
1
|
46
|
|
Computers -- Bibliography. : Morrill, Chester.
|
1969
|
1
|
48
|
|
Computers -- Canada -- History. : Vardalas, John N.
|
2001
|
1
|
49
|
|
Computers -- Circuits. : Ward, Stephen A.
|
1999
|
1
|