29085 |
|
Wakefield T., Mane A., Bowler D. |
Introduction to Mobile Communications: Technology, Services, Markets |
2006 | •• |
29084 |
|
Dale N.B., Weems C., Headington M.R. |
Introduction to Java and Software Design: Swing Update |
2002 | •• |
29083 |
|
Kaschek R.H. (ed.) |
Intelligent Assistant Systems: Concepts, Techniques, and Technologies |
2007 | •• |
29082 |
|
Vasilecas O. (ed.) |
Information Systems Development: Advances in Theory, Practice, and Education |
2005 | •• |
29081 |
|
Nivre J. |
Inductive Dependency Parsing |
2006 | •• |
29080 |
|
Gonzales M.L. |
IBM Data Warehousing: With IBM Business Intelligence Tools |
2003 | •• |
29079 |
|
Barrier T. |
Human Computer Interaction Developments and Management |
2002 | •• |
29078 |
|
McManus J.P. |
How to Program Visual Basic 5.0 Control Creation Edition: Creating Activex |
1997 | •• |
29077 |
|
Shaughnessy A., Segmeister S. |
How to Be a Graphic Designer Without Losing Your Soul |
2005 | •• |
29076 |
|
Browne S.E. |
High Definition Postproduction: Editing and Delivering HD Video |
2006 | •• |
29075 |
|
Ross A.A., Jain A.K., Zhang D. |
Multimodal Biometrics: Human Recognition Systems |
2005 | •• |
29074 |
|
Saha P. (ed.) |
Handbook of Enterprise Systems Architecture in Practice |
2007 | •• |
29073 |
|
Howcroft D. (ed.), Trauth E.M. (ed.) |
Handbook of Critical Information Systems Research: Theory and Application |
2005 | •• |
29072 |
|
Hanson R., Tacy A. |
GWT in Action: Easy Ajax with the Google Web Toolkit |
2007 | •• |
29071 |
|
Center for Chemical Process Safety Staf |
Guidelines for Design Solutions for Process Equipment Failures |
1998 | •• |
29070 |
|
Drewes F. |
Grammatical Picture Generation |
2005 | •• |
29069 |
|
Shiratori R. (ed.), Araii K. (ed.), Fumitoshi K. (ed.) |
Gaming, Simulation and Society: Research Scope and Perspective |
2004 | •• |
29068 |
|
Endler D., Collier M. |
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions |
2007 | •• |
29067 |
|
Langetepe E., Zachmann G. |
Geometric Data Structures for Computer Graphics |
2006 | •• |
29066 |
|
Krawetz J. |
Hacking Ubuntu |
2007 | •• |
29065 |
|
Sivanandam S.N., Sumathi S., Deepa S.N. |
Introduction to Fuzzy Logic Using MATLAB |
2006 | •• |
29064 |
|
Sumathi S., Sivanandam S.N. |
Introduction to Data Mining and Its Applications |
2007 | •• |
29063 |
|
Bishop D. |
Introduction to Cryptography with Java Applets |
2003 • | •• |
29062 |
|
Haubold B. |
Introduction to Computational Biology: An Evolutionary Approach |
2006 | •• |
29061 |
|
Duffy D.J. |
Introduction to C++ for Financial Engineers with CD: An Object-Oriented Approach |
2006 | •• |
29060 |
|
Mullen T., Kurdali T., Roosendaal B. |
c Character Animation with Blender |
2007 | •• |
29059 |
|
Halabi B. |
Internet Routing Architectures |
1997 | •• |
29058 |
|
Hammoud R.I. (Ed) |
Interactive Video: Methods and Applications |
2006 | •• |
29057 |
|
Silverman B.G. (Ed), Jain L.C. (Ed) |
Intelligent Paradigms for Healthcare Enterprises |
2005 • | •• |
29056 |
|
Ichalkaranje A. (Ed), Jain L.C. (Ed) |
Intelligent Paradigms for Assistive and Preventive Healthcare |
2006 | •• |
29055 |
|
Yap K.H. (Ed), Wang L. (Ed), Tan Y.- P. (Ed) |
Intelligent Multimedia Processing with Soft Computing |
2004 | •• |
29054 |
|
Ma Z. |
Intelligent Databases: Technologies and Applications |
2006 | •• |
29053 |
|
Ruan D. (Ed), Kerre E. (Ed), Chen G. (Ed) |
Intelligent Data Mining |
2005 • | •• |
29052 |
|
Keedwell E. |
Intelligent Bioinformatics: The Application of Artificial Intelligence Techniques to Bioinformatics Problems |
2005 | •• |
29051 |
|
Tipton H.F., Krause M. |
Information Security Management Handbook |
2006 • | •• |
29050 |
|
Glitho R., Pierre S. (Ed), Karmouch A. (Ed) |
Intelligence in Communication Systems: IFIP International Conference on Intelligence in Communication Systems, Intellcomm 2005, Montreal, Canada, October 17-19 2005 |
2005 | •• |
29049 |
|
Barkley B.T. |
Integrated Project Management |
2006 • | •• |
29048 |
|
Flynn N. |
Instant Messaging Rules: A Business Guide to Managing Policies, Security, and Legal Issues for Safe IM Communication |
2003 | •• |
29047 |
|
Holmes D.E., Jain L.C. (Ed) |
Innovations in Machine Learning: Theory and Applications |
2006 | •• |
29046 |
|
Sato-ILIC M., Jain L.C. |
Innovations in Fuzzy Clustering: Theory and Applications |
2006 | •• |
29045 |
|
Kahn E. |
Innovate or Perish: Managing the Enduring Technology Company in the Global Market |
2006 | •• |
29044 |
|
Macia E.A. (Ed), Ramos C.R. (Ed), Cervera A.S. (Ed) |
Information Technology in Languages for Specific Purposes |
2006 • | •• |
29042 |
|
Lodder A.R., Oskamp A. (Ed) |
Information Technology and Lawyers: Advanced Technology in the Legal Domain, from Challenges to Daily Routine |
2006 | •• |
29041 |
|
Quigley M. (Ed) |
Information Security and Ethics: Social and Organizational Issues |
2004 | •• |
29040 |
|
Griffiths P. |
HTML Dog: The Best-Practice Guide to XHTML and CSS |
2006 | •• |
29039 |
|
Duzi M. (Ed), Jaakkola H. (Ed) |
Information Modelling and Knowledge Bases XVIII - Volume 154 Frontiers in Artificial Intelligence and Applications |
2007 | •• |
29038 |
|
Grana M., Wang P. (Ed), Duro R. (Ed) |
Information Processing with Evolutionary Algorithms |
2004 | •• |
29037 |
|
Kiyoki Y. (Ed), Jaakkola H. (Ed) |
Information Modelling and Knowledge Bases XVII: Volume 136 Frontiers in Artificial Intelligence and Applications |
2006 | •• |
29036 |
|
van der Hoek W. (Ed) |
Information, Interaction, and Agency |
2005 • | •• |
29035 |
|
Moens M.- F. |
Information Extraction: Algorithms and Prospects in a Retrieval Context: Algorithms and Prospects in a Retrieval Context |
2006 | •• |