Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
Ìåõìàòÿíàì
square Ïåðâûé êóðñ

square Âòîðîé êóðñ

square Òðåòèé êóðñ

square ×åòâåðòûé êóðñ

square Ïÿòûé êóðñ
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
Êðàñîòà
blank
blank
Áûñòðûé ïåðåõîä
Ïî íàçâàíèþ:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z À Á Â Ã Ä Å ¨ Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
Ïî àâòîðó:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ¨ À Á Â Ã Ä Å Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
blank
Âñå ðåñóðñû
Ñîðòèðîâêà:

ID asc desc pic Àâòîðû asc desc Íàçâàíèå asc desc Ãîä asc desc Äîï.
24591 Stankovsky M. Creating the discipline of knowledge management 2005
24592 Vander Veer E.A., Lowe D., Ray E.J. Creating Web pages all-in-one desk reference for dummies 2004
24593 Bligh P., Turk D. CRM unplugged 2004
24594 Smart J., Hock K., Csomor S. Cross-Platform GUI Programming with wxWidgets 2005
24595 Joye M., Quisquater J. Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004, Proceedings 2004
24596 Gutmann P. Cryptographic Security Architecture: Design and Verification 2003
24597 Walther H., Santry P. CYA: Securing Exchange Server 2003 & Outlook Web Access 2004
24598 Parker T., Sachs M., Shaw E. Cyber Adversary Characterization: Auditing the Hacker Mind 2004
24599 Petrocelli T. Data Protection and Information Lifecycle Management 2005
24600 Chen W.-J. DB2 UDB V8 and WebSphere V5: Performance Tuning and Operations Guide 2004
24601 Schifreen R. Defeating the Hacker: A Non-Technical Guide to Computer Security 2006
24602 Serrat J., Galis A. Deploying and Managing IP over WDM Networks 2003
24603 Jafari A., Sheehan M. Designing Portals: Opportunities and Challenges 2003
24604 Grebler E. Digital Performer 4 Ignite! 2003
24605 Di Stefano M. Distributed data management for grid computing 2005
24606 Kosch H. Distributed Multimedia Database Technologies Supported by MPEG-7 and MPEG-21 2004
24607 McFarland D.S. Dreamweaver MX 2004: The Missing Manual 2004
24608 Gumaste A., Antony T. DWDM Network Designs and Engineering Solutions 2002
24609 Santamaria J.C., Fratta D. Discrete Signals and Inverse Problems: An Introduction for Engineers and Scientists 2005
24610 Moore B. Eclipse Development using the Graphical Editing Framework and the Eclipse Modeling Framework 2004
24611 Weckert J. Electronic Monitoring in the Workplace: Controversies and Solutions 2005
24612 Keenan J. Encyclopedia of American Indian Wars 1492–1890 1997
24613 Leeming D., Leeming M. Encyclopedia of Creation Myths 1994
24614 Charny I., Tutu D. Encyclopedia of Genocide 2000
24615 Bartosh M., Faas R. Essential Mac OS X Panther Server Administration 2005
24616 Shiu S., Pal S. Foundations of Soft Case-Based Reasoning 2004
24617 Horn A. Face It: Recognizing and Conquering The Hidden Fear That Drives All Conflict At Work 2003
24618 Clevé B. Film Production Management 2006
24619 Schmidt Ch. Game Theory and Economic Analysis 2002
24620 Hipson P. Firefox and Thunderbird: Beyond Browsing and Email 2005
24621 Grossman M. Encyclopedia of The Persian Gulf War 1995
24622 MacDonald M., Milstein S. Excel: The Missing Manual 2004
24623 Raz D., Juhola A., Serrat-Fernandez J. Fast and Efficient Context-Aware Services 2006
24624 Heine G., Sagkob H. GPRS: Gateway to Third Generation, Mobile Networks 2003
24625 Pogue D. GarageBand2: The Missing Manual 2005
24626 Koch St. Free/Open Source, Software Development 2005
24627 Zapawa T. Excel Advanced Report Development 2005
24628 Orchard L. Hacking RSS and Atom 2005
24629 Mishra Pr., Dutt N. Functional Verification of Programmable Embedded Architectures 2005
24630 Beaver K. Hacking for Dummies 2004
24631 Berger A. Hardware and Computer Organization 2005
24632 Horton M., Mugge Cl. Network Security Portable Reference 2003
24633 Osborne M., Summitt P. How to Cheat at Managing Information Security 2006
24634 Cole E., Krutz R. Hiding in Plain Sight: Steganography and the Art of Covert Communication 2003
24636 Travostino F., Mambretti J., Karmous-Edwards G. Grid Networks: Enabling Grids with Advanced Communication Technology 2006
24637 Joseph J., Fellenstein C. Grid Computing (IBM Press On Demand Series) 2003
24638 O’Dea M. HackNotes Windows Security Portable Reference 2003
24639 Hellerstein J., Diao Y., Parekh S. Feedback Control of Computing Systems 2004
24640 Hayden V., Webber M., Heller J. Getting an Investing Game Plan: Creating it, Working it, Winning it 2003
24641 Bali R. Clinical Knowledge Management: opportunities and Challenges 2005


blank
HR
@Mail.ru
© Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2024
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01!| Valid CSS! Î ïðîåêòå