27046 |
|
Moock C. |
Essential ActionScript 2.0 |
2004 • | •• |
27055 |
|
Farr J.M., Shatkin L. |
Enhanced Occupational Outlook Handbook |
2004 • | •• |
27058 |
|
Gucer V. |
High Availability Scenarios with IBM Tivoli Workload Scheduler and IBM Tivoli Framework |
2004 | •• |
27072 |
|
Baillie H.W. (Ed), Casey T. (Ed) |
Is Human Nature Obsolete?: Genetic Engineering and the Future of the Human Condition (Basic Bioethics Series) |
2004 | •• |
27095 |
|
Geiselhart G., Ehlenberger A., Fariborz D. |
Linux on IBM @server zSeries and S/390: Best Security Practices |
2004 | •• |
27114 |
|
Bott E. |
Microsoft Windows XP Inside Out |
2004 • | •• |
27115 |
|
Farley J.I. |
Military-to-Civilian Career Transition Guide |
2004 | •• |
27116 |
|
Furht B., Kirovski D. |
Multimedia Security Handbook |
2004 | •• |
27121 |
|
Fullerton T., Swain C., Hoffman S. |
Game Design Workshop: Designing, Prototyping, and Playtesting Games |
2004 | •• |
27128 |
|
Howlett T. |
Open Source Security Tools: Securing Your Unix or Windows Systems |
2004 | •• |
27131 |
|
Sadtler C. |
Patterns: Broker Interactions for Intra- and Inter-Enterprise |
2004 | •• |
27135 |
|
Nishizeki T., Rahman S. |
Planar Graph Drawing |
2004 | •• |
27140 |
|
Zend Technologies Staff |
Zend PHP Certification Study Guide |
2004 | •• |
27147 |
|
Bolante A. |
Premiere Elements for Windows: Visual QuickStart Guide |
2004 | •• |
27151 |
|
Richardson W.C., Vitale J., Avondolio D. |
Professional Java Programming, JDK 5 |
2004 • | •• |
27165 |
|
Buckland P. |
Reshaping the Future: Education and Post-Conflict Reconstruction |
2004 | •• |
27206 |
|
Dymond A. |
Asymmetric Interconnection Charges for Rural Areas: Addressing the Interconnection Challenge in Developing Countries |
2004 | •• |
27214 |
|
Misfeldt T., Gray A., Metz E. |
Elements of C++ Style |
2004 • | •• |
27215 |
|
Coleman K. |
The Secret Wars of Judi Bari: A Car Bomb, the Fight for the Redwoods, and the End of Earth First |
2004 | •• |
27241 |
|
Ëàíäàó Ë.Ä., Ëèôøèö Å.Ì. |
Òåîðåòè÷åñêàÿ ôèçèêà. Ó÷åáíîå ïîñîáèå â 10 òîìàõ (òîì 1). Ìåõàíèêà |
2004 • | •• |
27256 |
|
Eberly D.H. |
3D game engine architecture |
2004 | •• |
27260 |
|
Ñêåìáðåé Äæ., Ìàê-Êëàð Ñ. |
Ñåêðåòû õàêåðîâ. Áåçîïàñíîñòü Windows Server 2003 - ãîòîâûå ðåøåíèÿ |
2004 | •• |
27277 |
|
Glisic S.G. |
Advanced wireless communications |
2004 | •• |
27278 |
|
Worner M. |
Applied C# in financial markets |
2004 | •• |
27287 |
|
Sestoft P., Hansen H.I. |
C# precisely |
2004 | •• |
27304 |
|
Bayer M. |
Computer telephony demystified |
2004 | •• |
27318 |
|
Kaspersky K. |
CD Cracking Uncovered: Protection against Unsanctioned CD Copying |
2004 | •• |
27329 |
|
Oppel A. |
Databases demystified |
2004 | •• |
27342 |
|
Hawley D. |
Excel Hacks |
2004 • | •• |
27354 |
|
Dandamudi S.P. |
Guide to RISC Processors: For Programmers and Engineers |
2004 | •• |
27368 |
|
Kann C.W. |
Creating Components: Object Oriented, Concurrent, and Distributed Computing in Java |
2004 | •• |
27373 |
|
Kipper G. |
Investigator's Guide to Steganography |
2004 | •• |
27392 |
|
Johnson M.K., Troan E.W. |
Linux Application Development |
2004 • | •• |
27393 |
|
Wehrle K., Pahlke F., Ritter H. |
Linux Network Architecture |
2004 • | •• |
27405 |
|
Edwards L., Barker R. |
Developing Series 60 Applications: A Guide for Symbian OS C++ Developers |
2004 | •• |
27406 |
|
Rumsey F., Watkinson J. |
Digital Interface Handbook |
2004 • | •• |
27422 |
|
Tull C. |
Mastering Business Analysis with Crystal Reports 9 |
2004 | •• |
27463 |
|
Kerievsky J., Fowler M., Johnson R. |
Refactoring to Patterns (The Addison-Wesley Signature Series) |
2004 | •• |
27507 |
|
Pierce B.C. |
Advanced topics in types and programming languages |
2004 | •• |
27514 |
|
Soper M.E. |
Absolute Beginner's Guide to A+ Certification: Covers the Hardware and Operating Systems Exam |
2004 | •• |
27530 |
|
Menga J., Timm C. |
CCSP: Secure Intrusion Detection and Safe Implementation Study Guide (642-531 and 642-541) |
2004 • | •• |
27537 |
|
Murch R. |
Autonomic Computing |
2004 | •• |
27560 |
|
Bucker A. |
Enterprise Security Architecture Using IBM Tivoli Security Solutions |
2004 • | •• |
27582 |
|
Finkelstein E. |
AutoCAD 2005 and AutoCAD LT 2005 Bible |
2004 • | •• |
27585 |
|
Esposito D. |
Introducing Microsoft Asp.Net 2.0 |
2004 | •• |
27587 |
|
Yarwood A. |
Introduction to AutoCAD 2004: 2D and 3D Design |
2004 • | •• |
27590 |
|
Fellinge J. |
IT Administrator's Top 10 Introductory Scripts for Windows |
2004 | •• |
27599 |
|
Forman N. |
Java Reflection in Action |
2004 | •• |
27605 |
|
Rainsberger J.B., Stirling S. |
Junit Recipes: Practical Methods for Programmer Testing |
2004 | •• |
27616 |
|
Young A.L., Yung M. |
Malicious Cryptography: Exposing Cryptovirology |
2004 | •• |