We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
An abstract is not available for this content so a preview has been provided. Please use the Get access link above for information on how to access this content.
Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)
References
Brothers, H. (1988). “Tricks to Retrieve Your Lost File”, PCResource, (21) 84–90.Google Scholar
COMPAQ Computer Corp. (1986). “MS-DOS Version 3.2 Reference Guide”.Google Scholar
COMments (1988). “XRAYPLOT by Dennis Canfield”, Pow. Diff., 3 (1) 66.Google Scholar
COMments (1988). “Our DOS Environment”, Pow. Diff., 3(2) 126–131.Google Scholar
COMments (1988). “Porting MainFrame Software to the PC”, Pow. Diff., 3(4) 263.Google Scholar
Edmonds, J. (1986). “JCPDS-ICDD Task Group on Cell Parameter Refinement”, Pow. Diff., 1(1) 66–76.Google Scholar
Kolstad, R. (1989). “Some System Security Suggestions”, UNIX Review, 7(2) 90–6.Google Scholar