Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
Ìåõìàòÿíàì
square Ïåðâûé êóðñ

square Âòîðîé êóðñ

square Òðåòèé êóðñ

square ×åòâåðòûé êóðñ

square Ïÿòûé êóðñ
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
Êðàñîòà
blank
blank
Áûñòðûé ïåðåõîä
Ïî íàçâàíèþ:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z À Á Â Ã Ä Å ¨ Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
Ïî àâòîðó:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ¨ À Á Â Ã Ä Å Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
blank
Âñå ðåñóðñû
Ñîðòèðîâêà:

ID asc desc pic Àâòîðû asc desc Íàçâàíèå asc desc Ãîä asc desc Äîï.
28049 Rybakzyk P. Expert Network Time Protocol: An Experience in Time with NTP 2005
28056 Bezdek J.C., Keller J., Krisnapuram R. Fuzzy Models and Algorithms for Pattern Recognition and Image Processing 2005
28061 Yu T., Riolo R., Worzel B. Genetic Programming Theory and Practice III 2005
28064 Boukerche A. Handbook of Algorithms for Wireless Networking and Mobile Computing 2005
28069 Freeman E., Freeman E. Head First HTML with CSS & XHTML 2005
28078 Blake B., Sahlin D. How to do everything with Macromedia Flash 2005
28079 Hall R., Ball D., Shilmover B. How to Do Everything with Your Dell Axim Handheld 2005
28080 Seffah A. (ed.), Gulliksen J., Desmarais M.C. Human-Centered Software Engineering - Integrating Usability in the Software Development Lifecycle 2005
28081 Motta G. (ed.), Rizzo F. (ed.), Storer J.A. (ed.) Hyperspectral data compression 2005
28090 Courtney J.F. (ed.), Haynes J.D. (ed.), Paradice D.B. (ed.) Inquiring Organizations 2005
28109 Anthony G. Iterating Infusion 2005
28124 Educational Testing Service TOEFL iBT 2005
28129 Spencer D.W., Sebastian R. Understanding IBM Workplace Strategy and Products: Featuring Lotus Workplace 2005
28150 Fehily C. Windows XP: Visual Quickstart Guide 2005
28169 Mann K.D. JavaServer Faces in Action 2005
28194 Bramer M. Logic Programming with Prolog 2005
28197 Maloof M.A. (ed.) Machine Learning and Data Mining for Computer Security: Methods and Applications 2005
28198 Apolloni B. (ed.), Ghosh A. (ed.), Patnaik S. (ed.) Machine Learning and Robot Perception 2005
28203 Khan K., Zheng Y. Managing Corporate Information Systems Evolution and Maintenance 2005
28204 Kumar V., Srivastava J., Lazarevic A. Managing cyber threats 2005
28216 Vince J. Mathematics for Computer Graphics 2005
28221 Chen H., Fuller S.S., Friedman C. Medical Informatics: Knowledge Management and Data Mining in Biomedicine 2005
28238 Kneht-Thurmann S. Windows Small Business Server SBS 2003 2005
28243 Buyens J. Microsoft Visual Web Developer 2005
28250 Andriessen J.H.E. (ed.), Vartiainen M. (ed.) Mobile Virtual Work 2005
28256 Lu C.-S. Multimedia Security: : Steganography and Digital Watermarking Techniques for Protection of Intellectual Property 2005
28276 Dargan P.A. Open Systems And Standards For Software Product Development 2005
28277 Seddon C. OpenGL Game Development 2005
28284 Caruso K., Potter B., Long J. OS X for Hackers at Heart 2005
28286 Gunderloy M. Painless Project Management with FogBugz 2005
28292 Bass S. PC Annoyances 2005
28294 Burnett M., Kleiman D. Perfect Passwords 2005
28309 Mittal K., Kanchanavally S. Pro Apache Beehive 2005
28312 Linwood J., Minter D. Pro Hibernate 3 2005
28313 Virkus R. Pro J2ME Polish 2005
28314 Curran D., Ferracchiati F.C., Gilani S.F. Pro .NET 1.1 Remoting, Reflection, and Threading 2005
28318 Foley R., Lester A. Pro Perl Debugging 2005
28319 Wainwright P. Pro Perl 2005
28343 Gilbert J. QuickBooks 2005 Bible, Desktop Edition 2005
28355 Good N.A. Regular Expression Recipes for Windows Developers: A Problem-Solution Approach 2005
28372 Weippl E.R. Security in e-learning 2005
28380 Johnson C.F.A. Shell Scripting Recipes: A Problem-Solution Approach 2005
28381 Richardson R., Gwaltney W. Ship it! A Practical Guide to Successful Software Projects 2005
28386 Chern S.-S., Shen Z. Riemann-Finsler Geometry 2005
28393 Âîðîíîâà Í.Â. Àíàòîìèÿ öåíòðàëüíîé íåðâîíîé ñèñòåìû 2005
28402 Ïåíðîóç Ð. Òåíè ðàçóìà. Â ïîèñêàõ íàóêè î ñîçíàíèè 2005
28421 Morrison R., Oquendo F. Software Architecture : 2nd European Workshop, EWSA 2005, Pisa, Italy, June 13-14, 2005, Proceedings 2005
28423 Craig P. Software Piracy Exposed 2005
28424 Acuna S.T., Juristo N. Software process modeling 2005
28425 Pohl K., Böckle G., van der Linden F.J. Software Product Line Engineering: Foundations, Principles and Techniques 2005


blank
HR
@Mail.ru
© Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2024
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01!| Valid CSS! Î ïðîåêòå