3881 |
|
Skoruppa N.-P. |
Mathematiques pur les sciences naturelles |
2003 | •• |
3882 |
|
Skoruppa N.-P. |
A crash course in Lie algebras |
2003 | •• |
3883 |
|
Ïîñòíèêîâ Ì.Ì. |
Ëåêöèè ïî ãåîìåòðèè. Ñåìåñòð I. Àíàëèòè÷åñêàÿ ãåîìåòðèÿ |
1979 | •• |
3885 |
|
Makkai M. |
Fibrational formulation of intuitionistic predicate logic I: completeness according to Godel, Kripke, and Lauchli (part 1) |
1993 | •• |
3886 |
|
Makkai M. |
Fibrational formulation of intuitionistic predicate logic I: completeness according to Godel, Kripke, and Lauchli (part 2) |
1993 | •• |
3887 |
|
Mitrinovic D.S. |
Elementary matrices |
1965 | •• |
3888 |
|
Le Bruyn L. |
Noncommutative geometry |
2000 | •• |
3889 |
|
Shafarevich I.R. |
Selected chapters from algebra |
1998 | •• |
3891 |
|
Alon N., Spenser J. |
The probabilistic method |
1991 | •• |
3892 |
|
Bush M., Dunaway D. |
CMMI® Assessments |
2005 | •• |
3893 |
|
Nantz B. |
Open Source .NET Development |
2004 | •• |
3894 |
|
Spinellis D. |
Code Reading: The Open Source Perspective |
2003 | •• |
3895 |
|
Sutter H., Alexandrescu A. |
C++ Coding Standards: 101 Rules, Guidelines, and Best Practices |
2004 | •• |
3896 |
|
Pekowsky L. |
Apache Jakarta and Beyond: A Java Programmer's Introduction |
2004 | •• |
3897 |
|
Abrahams D., Gurtovoy A. |
C++ Template Metaprogramming: Concepts, Tools, and Techniques from Boost and Beyond |
2004 | •• |
3898 |
|
Dewhurst S. |
C++ Common Knowledge |
2005 | •• |
3899 |
|
Ãàììà Ý., Õåëì Ð., Äæîíñîí Ð. |
Ïðèåìû îáúåêòíî-îðèåíòèðîâàííîãî ïðîåêòèðîâàíèÿ. Ïàòòåðíû ïðîåêòèðîâàíèÿ |
2001 | •• |
3900 |
|
Gamma E., Helm R., Johnson R. |
Design Patterns CD. Elements of reusable object-oriented software |
1994 | •• |
3901 |
|
Jacobson I., Ng P.-W. |
Aspect-oriented software development with use cases |
2004 | •• |
3902 |
|
Pattison T., Hummel J. |
Building applications and components with Visual Basic .NET |
2003 | •• |
3903 |
|
Shapiro J.R., Policht M. |
Building high availability Windows Server™ 2003 solutions |
2004 | •• |
3904 |
|
Fox D., Box J. |
Building solutions with the Microsoft .NET compact framework: architecture and best practices for mobile development |
2003 | •• |
3905 |
|
Ahern D.M., Armstrong J., Clouse A. |
CMMI® SCAMPI Distilled |
2005 | •• |
3906 |
|
Gamma E., Beck K. |
Contributing to eclipse: principles, patterns, and plug-ins |
2003 | •• |
3907 |
|
Dewhurst S.C. |
C++ gotchas: avoiding common problems in coding and design |
2002 | •• |
3908 |
|
Cockburn A. |
Crystal clear a human-powered methodology for small teams |
2004 | •• |
3909 |
|
Nock C. |
Data access patterns: database interactions in object-oriented applications |
2003 | •• |
3910 |
|
Gupta A., Laliberte S. |
Defend I.T.: security by example |
2004 | •• |
3911 |
|
Shalloway A., Trott J.R. |
Design patterns explained a new perspective on object-oriented design |
2004 • | •• |
3912 |
|
Riordan R.M. |
Designing effective database systems |
2005 | •• |
3913 |
|
Yuan M.J., Sharp K. |
Developing scalable series 40 applications: a guide for Java developers |
2004 | •• |
3914 |
|
Colyer A., Clement A., Harley G |
Eclipse AspectJ: aspect-oriented programming with AspectJ and the eclipse AspectJ development tools |
2004 | •• |
3915 |
|
Carlson D. |
Eclipse distilled |
2005 | •• |
3916 |
|
Budinsky F., Steinberg D., Merks E. |
Eclipse modeling framework: a developer's guide |
2003 | •• |
3917 |
|
Wagner B. |
Effective C#: 50 specific ways to improve your C# |
2004 | •• |
3918 |
|
Bulka D., Mayhew D. |
Efficient C++ performance programming techniques |
1999 | •• |
3919 |
|
Beck K., Andres C. |
Extreme programming explained: embrace change |
2004 • | •• |
3920 |
|
Iverson W. |
Hibernate: a J2EE™ developer's guide |
2004 | •• |
3921 |
|
Blackburn P., Vaughn W.R. |
Hitchhiker's guide to SQL Server 2000 reporting services |
2004 | •• |
3922 |
|
Wilson M. |
Imperfect C++ practical solutions for real-life programming |
2004 | •• |
3923 |
|
Schaffer E. |
Institutionalization of usability: a step-by-step guide |
2004 | •• |
3924 |
|
Edwards B.M., Giuliano L.A., Wright B.R. |
Interdomain multicast routing: practical Juniper networks and Cisco systems solutions |
2002 | •• |
3925 |
|
Bishop M. |
Introduction to computer security |
2004 | •• |
3926 |
|
Alberts C., Dorofee A. |
Managing information security risks: the OCTAVE approach |
2002 | •• |
3927 |
|
Putz J. |
Maximizing ASP.NET |
2005 | •• |
3928 |
|
Arthorne J., Laffra C. |
Official Eclipse 3.0 Faqs |
2004 | •• |
3929 |
|
Yuen P.K., Lau V. |
Practical Web technologies |
2003 | •• |
3930 |
|
Ross R.G. |
Principles of the business rule approach |
2003 | •• |
3931 |
|
Homer A., Sussman D., Howard R. |
ASP.NET v.2.0—the beta version |
2004 | •• |
3932 |
|
Singh I., Brydon S., Murray G. |
Designing Web services with the J2EE™ 1.4 platform JAX-RPC, SOAP, and XML technologies |
2004 | •• |