25202 |
|
Godar S.H., Ferris S.P. |
Virtual and Collaborative Teams |
2004 | •• |
25201 |
|
Gough M. |
Video Conferencing Over IP: Configure, Secure, and Troubleshoot |
2006 | •• |
25200 |
|
Solid Quality Learning |
Microsoft SQL Server 2005: Applied Techniques Step by Step |
2006 | •• |
25199 |
|
Moreno V. |
Network Virtualization |
2006 | •• |
25198 |
|
Pulier E., Taylor H. |
Understanding Enterprise SOA |
2006 | •• |
25197 |
|
Meigs T. |
Ultimate Game Design: Building Game Worlds |
2003 | •• |
25196 |
|
Janevski T. |
Traffic Analysis and Design of Wireless IP Networks |
2003 | •• |
25195 |
|
Berger T.W., Glanzman D.L. (eds.) |
Toward Replacement Parts for the Brain: Implantable Biomimetic Electronics as Neural Prostheses |
2005 | •• |
25194 |
|
Palloff R.M., Pratt K. |
The Virtual Student: A Profile and Guide to Working with Online Learners |
2003 | •• |
25193 |
|
Cawood S. |
Unauthorized Halo 2 Battle Guide: Advanced Combat Techniques |
2004 | •• |
25192 |
|
Merritt D., McCombs M.E. |
Two W's of Journalism: Why and What of Public Affairs Journalism |
2004 | •• |
25191 |
|
Noam E.M., Groebel J., Gerbarg D. |
Internet Television |
2003 | •• |
25190 |
|
Kent R.D. |
The MIT Encyclopedia of Communication Disorders |
2003 | •• |
25189 |
|
Tzfira T., Citovsky V. |
Nuclear Import and Export in Plants and Animals |
2005 | •• |
25188 |
|
Welborn R., Kasten V. |
The Jericho Principle: How Companies Use Strategic Collaboration to Find New Sources of Value |
2003 | •• |
25187 |
|
Holzman C. |
Healthy PC: Preventive Care and Home Remedies for Your Computer |
2003 | •• |
25186 |
|
Stout C.E., Hayes R.A. (eds.) |
The Evidence-Based Practice: Methods, Models, and Tools for Mental Health Professionals |
2004 | •• |
25185 |
|
Heather N., Stockwell T. |
The Essential Handbook of Treatment and Prevention of Alcohol Problems |
2003 | •• |
25184 |
|
Raithel M.A. |
The Complete Guide to SAS Indexes |
2006 | •• |
25183 |
|
Camrass R., Farncombe M. |
Atomic: Reforming the Business Landscape into the New Structures of Tomorrow |
2004 | •• |
25182 |
|
Gottschalk P. |
Strategic Knowledge Management Technology |
2005 | •• |
25181 |
|
Kuchana P. |
Software Architecture Design Patterns in Java |
2004 | •• |
25180 |
|
Godara L.C. |
Smart Antennas |
2003 | •• |
25179 |
|
Johnson R.S. |
Singular Perturbation Theory: Mathematical and Analytical Techniques with Applications to Engineering |
2005 | •• |
25178 |
|
Ward R.D. |
Saving the Corporate Board: Why Boards Fail and How to Fix Them |
2003 | •• |
25177 |
|
Lloyd S.J., Peckham J. |
Practicing Software Engineering in the 21st Century |
2003 | •• |
25176 |
|
Sutcliffe N., Nakayama M. |
Managing It Skills Portfolios: Planning, Acquisition and Performance Evaluation |
2005 | •• |
25175 |
|
Fung K.T. |
Network Security Technologies |
2004 • | •• |
25174 |
|
Bundy A., Basin D., Hutter D. |
Rippling: Meta-Level Guidance for Mathematical Reasoning |
2005 | •• |
25173 |
|
Petersen R., Haddad I. |
Red Hat Linux Pocket Administrator |
2003 | •• |
25172 |
|
Mun J. |
Real Options Analysis Course: Business Cases and Software Applications |
2003 | •• |
25171 |
|
Belfiore M.E., Defoe T.A., Folinsbee S. |
Reading Work: Literacies in the New Workplace |
2004 | •• |
25170 |
|
Chen K. |
Progress on Cryptography: 25 Years of Cryptography in China |
2004 | •• |
25169 |
|
Descartes A., Carty A., Bunce T. |
Programming the Perl DBI: Database Programming with Perl |
2000 | •• |
25168 |
|
Trappl R. |
Programming for Peace: Computer-Aided Methods for International Conflict Resolution and Prevention |
2006 | •• |
25167 |
|
Dybå T., Dingsøyr T., Brede Moe N. |
Process Improvement in Practice: A Handbook for IT Companies |
2004 | •• |
25166 |
|
Davidson L., Kline K., Windisch K. |
Pro SQL Server 2005 Database Design and Optimization |
2006 | •• |
25165 |
|
Robinson P., Vogt H., Wagealla W. |
Privacy, Security and Trust within the Context of Pervasive Computing |
2005 | •• |
25164 |
|
Le Bodic G. |
Multimedia Messaging Service: An Engineering Approach to MMS |
2003 | •• |
25163 |
|
Igoe T., O'Sullivan D. |
Physical Computing: Sensing and Controlling the Physical World with Computers |
2004 | •• |
25162 |
|
James L. |
Phishing Exposed |
2005 | •• |
25161 |
|
Cusumano M., Shirky C., Feller J. |
Perspectives on Free and Open Source Software |
2005 | •• |
25160 |
|
Jue J.P., Vokkarane V.M. |
Optical Burst Switched Networks |
2005 | •• |
25159 |
|
Guerin R., Shepherd A. |
Nuendo Power! |
2004 | •• |
25158 |
|
Hunt C. |
Linux Network Servers |
2002 | •• |
25157 |
|
Tengler N. |
New Era Value Investing: A Disciplined Approach to Buying Value and Growth Stocks |
2003 | •• |
25156 |
|
Damsgaard J., Henriksen H.Z. |
Networked Information Technologies: Diffusion and Adoption |
2004 | •• |
25155 |
|
Brown R.T.T. |
Handbook of Pediatric Psychology in School Settings |
2004 | •• |
25154 |
|
Kaufman A.S., Lichtenberger E.O., Fletcher-Janzen E. |
Essentials of KABC-II Assessment |
2005 | •• |
25153 |
|
Gaiti D., Galmes S., Puigjaner R. (eds.) |
Network Control and Engineering for QOS, Security and Mobility, III |
2005 | •• |