earth sheltered housing design : Guidelines examples and references / Minnesota.
By: Publication details: USA Van Nortrand Reinhold co 1979ISBN:- 0442288212
- 728 MIN
No physical items for this record
There are no comments on this title.
Log in to your account to post a comment.
-
1
Comparative Analysis of Routing Protocols for AD HOC Network /
by Jokhio, Imran Ali -
2
Comparative analysis of SQL query optimization techniques using:
by Mahar, Sana. -
3
An access control implementation to secure cloud resources /
by Shoro, Muzna. -
4
Automated testing for mobile applications /
by Urooj Ahmed. -
5
Design Of RFID systems security method /
by Durr Muhammad -
6
Design of Rfid systems security Method /
by Durr Muhammad. -
7
Comparative analysis of routing protocols for ad HOC networks /
by Jokhio, Imran Ali. -
8
Automated testing for mobile applications /
by Urooj Ahmed. -
9
Automated testing for mobile applications /
by Urooj Ahmed. -
10
Comparative analysis of SQL query optimization techniques using:
by Mahar, Sana. -
11
A Spoofing proof stateless session model /
by Soomro, Fozia Sultana -
12
Design of a Rfid systems security meyhod /
by Durr Muhammad -
13
Designing Architecture for live data migration in application data context /
by Shaikh, Mutiullah. -
14
Implementation of web cms and mapreduce algorithm by using java EE MVC framework /
by Palh, Rasool Bux -
15
Design and implementation of secure virtual box based cloud infrastructure /
by Faseeh Uddin Siddiqui. -
16
Design and implementation of secure virtualbox based cloud infrastructure /
by Siddiqui, Faseeh uddin. -
17
Implementation of web CMS and mapreduce algorithm by using java ee MVC framework /
by Palah, Rasool Bux. -
18
An access control implementation to secure cloud resources /
by Shoro, Munza. -
19
Comparative analysis of SQL query optimization techniques using :oracle, postgresql /
by Mahar, sana. -
20
HQL query optimization improving performance of hibernate ORM based applications /
by Nohani, Badaruddin.
