点击切换搜索课件文库搜索结果(1259)
文档格式:PDF 文档大小:145.12KB 文档页数:51
北京大学:《宏观经济学 Macroeconomics》课程电子教案_第三篇 总供给分析 第八章 新古典主义的 AS 曲线 8.3 新古典主义的 AD 一 AS 分析(三)
文档格式:PDF 文档大小:282.57KB 文档页数:83
北京大学:《宏观经济学 Macroeconomics》课程电子教案_第三篇 总供给分析 第八章 新古典主义的 AS 曲线 8.3 新古典主义的 AD 一 AS 分析(二)
文档格式:PDF 文档大小:808.46KB 文档页数:59
西安建筑科技大学:《水资源利用与保护》参考资料_Wastewater as a resource_Wastewater as a resource - EuroCase Paris
文档格式:PDF 文档大小:243.62KB 文档页数:67
Forthcoming in the Chicago Law Review (2005) In March of 2003, as American tanks rolled toward Baghdad, international lawyers in the United States and abroad decried the action as a violation of the United Nations Charter. The invasion, some worried, would strip away the last pretense that international law could
文档格式:PDF 文档大小:79.73KB 文档页数:4
In class, we saw the connection between the so-called Hermite matrix and the semi-circular law. There is actually a deeper story that connects the classical random matrix ensembles to the classical orthogonal polynomials studied in classical texts such as [1] and more recent monographs such as
文档格式:PDF 文档大小:736.72KB 文档页数:5
Tetrazole and triazole as bioisosteres of carboxylic acid_Discovery of diketo tetrazoles and diketo triazoles as anti-HCV agents
文档格式:DOC 文档大小:3.3MB 文档页数:41
Operations used for the treatment of wastewater in which change is brought about by means of or through the application of physical forces are known as physical unit operations. Because physical unit operations were derived originally from observations of the physical world, they were the first treatment methods to be used. Today, physical unit operations, as shown on Fig. 5-1, are a major part of most wastewater
文档格式:PDF 文档大小:3.78MB 文档页数:40
• Survey authentication mechanisms • List available access control implementation options • Explain the problems encryption is designed to solve • Understand the various categories of encryption tools as well as the strengths, weaknesses, and applications of each • Learn about certificates and certificate authorities
文档格式:PDF 文档大小:2.37MB 文档页数:54
It is term used as a convenient description for all phases of the disease caused by a bacteria called Brucella. Many names have been applied to it as: 1. Malta fever 2. Mediterranean fever. 3. Gibraltar or rock fever 4. Undulant fever
文档格式:PDF 文档大小:735.96KB 文档页数:17
• Define computer security as well as basic computer security terms • Introduce the C-I-A Triad • Introduce basic access control terminology • Explain basic threats, vulnerabilities, and attacks • Show how controls map to threats
首页上页2526272829303132下页末页
热门关键字
搜索一下,找到相关课件或文库资源 1259 个  
©2008-现在 cucdc.com 高等教育资讯网 版权所有