| 27006 |
|
Staff of World Bank |
A Guide to Competitive Vouchers in Health |
2004 | •• |
| 27008 |
|
York R. |
Beginning CSS: Cascading Style Sheets for Web Design |
2004 | •• |
| 27010 |
|
Zimmerman R.M., Lehman A.W. |
Boards that love fundraising |
2004 | •• |
| 27021 |
|
Dillon A. |
Designing usable electronic text |
2004 • | •• |
| 27026 |
|
Dipboye R.L., Colella A. |
Discrimination at Work: The Psychological and Organizational Bases |
2004 | •• |
| 27030 |
|
Ballew J., Duntemann J. |
Degunking Windows |
2004 | •• |
| 27043 |
|
Enelow W.S., Kursmark L.M. |
Expert Resumes for Career Changers |
2004 | •• |
| 27046 |
|
Moock C. |
Essential ActionScript 2.0 |
2004 • | •• |
| 27055 |
|
Farr J.M., Shatkin L. |
Enhanced Occupational Outlook Handbook |
2004 • | •• |
| 27058 |
|
Gucer V. |
High Availability Scenarios with IBM Tivoli Workload Scheduler and IBM Tivoli Framework |
2004 | •• |
| 27072 |
|
Baillie H.W. (Ed), Casey T. (Ed) |
Is Human Nature Obsolete?: Genetic Engineering and the Future of the Human Condition (Basic Bioethics Series) |
2004 | •• |
| 27095 |
|
Geiselhart G., Ehlenberger A., Fariborz D. |
Linux on IBM @server zSeries and S/390: Best Security Practices |
2004 | •• |
| 27114 |
|
Bott E. |
Microsoft Windows XP Inside Out |
2004 • | •• |
| 27115 |
|
Farley J.I. |
Military-to-Civilian Career Transition Guide |
2004 | •• |
| 27116 |
|
Furht B., Kirovski D. |
Multimedia Security Handbook |
2004 | •• |
| 27121 |
|
Fullerton T., Swain C., Hoffman S. |
Game Design Workshop: Designing, Prototyping, and Playtesting Games |
2004 | •• |
| 27128 |
|
Howlett T. |
Open Source Security Tools: Securing Your Unix or Windows Systems |
2004 | •• |
| 27131 |
|
Sadtler C. |
Patterns: Broker Interactions for Intra- and Inter-Enterprise |
2004 | •• |
| 27135 |
|
Nishizeki T., Rahman S. |
Planar Graph Drawing |
2004 | •• |
| 27140 |
|
Zend Technologies Staff |
Zend PHP Certification Study Guide |
2004 | •• |
| 27147 |
|
Bolante A. |
Premiere Elements for Windows: Visual QuickStart Guide |
2004 | •• |
| 27151 |
|
Richardson W.C., Vitale J., Avondolio D. |
Professional Java Programming, JDK 5 |
2004 • | •• |
| 27165 |
|
Buckland P. |
Reshaping the Future: Education and Post-Conflict Reconstruction |
2004 | •• |
| 27206 |
|
Dymond A. |
Asymmetric Interconnection Charges for Rural Areas: Addressing the Interconnection Challenge in Developing Countries |
2004 | •• |
| 27214 |
|
Misfeldt T., Gray A., Metz E. |
Elements of C++ Style |
2004 • | •• |
| 27215 |
|
Coleman K. |
The Secret Wars of Judi Bari: A Car Bomb, the Fight for the Redwoods, and the End of Earth First |
2004 | •• |
| 27241 |
|
Ëàíäàó Ë.Ä., Ëèôøèö Å.Ì. |
Òåîðåòè÷åñêàÿ ôèçèêà. Ó÷åáíîå ïîñîáèå â 10 òîìàõ (òîì 1). Ìåõàíèêà |
2004 • | •• |
| 27256 |
|
Eberly D.H. |
3D game engine architecture |
2004 | •• |
| 27260 |
|
Ñêåìáðåé Äæ., Ìàê-Êëàð Ñ. |
Ñåêðåòû õàêåðîâ. Áåçîïàñíîñòü Windows Server 2003 - ãîòîâûå ðåøåíèÿ |
2004 | •• |
| 27277 |
|
Glisic S.G. |
Advanced wireless communications |
2004 | •• |
| 27278 |
|
Worner M. |
Applied C# in financial markets |
2004 | •• |
| 27287 |
|
Sestoft P., Hansen H.I. |
C# precisely |
2004 | •• |
| 27304 |
|
Bayer M. |
Computer telephony demystified |
2004 | •• |
| 27318 |
|
Kaspersky K. |
CD Cracking Uncovered: Protection against Unsanctioned CD Copying |
2004 | •• |
| 27329 |
|
Oppel A. |
Databases demystified |
2004 | •• |
| 27342 |
|
Hawley D. |
Excel Hacks |
2004 • | •• |
| 27354 |
|
Dandamudi S.P. |
Guide to RISC Processors: For Programmers and Engineers |
2004 | •• |
| 27368 |
|
Kann C.W. |
Creating Components: Object Oriented, Concurrent, and Distributed Computing in Java |
2004 | •• |
| 27373 |
|
Kipper G. |
Investigator's Guide to Steganography |
2004 | •• |
| 27392 |
|
Johnson M.K., Troan E.W. |
Linux Application Development |
2004 • | •• |
| 27393 |
|
Wehrle K., Pahlke F., Ritter H. |
Linux Network Architecture |
2004 • | •• |
| 27405 |
|
Edwards L., Barker R. |
Developing Series 60 Applications: A Guide for Symbian OS C++ Developers |
2004 | •• |
| 27406 |
|
Rumsey F., Watkinson J. |
Digital Interface Handbook |
2004 • | •• |
| 27422 |
|
Tull C. |
Mastering Business Analysis with Crystal Reports 9 |
2004 | •• |
| 27463 |
|
Kerievsky J., Fowler M., Johnson R. |
Refactoring to Patterns (The Addison-Wesley Signature Series) |
2004 | •• |
| 27507 |
|
Pierce B.C. |
Advanced topics in types and programming languages |
2004 | •• |
| 27514 |
|
Soper M.E. |
Absolute Beginner's Guide to A+ Certification: Covers the Hardware and Operating Systems Exam |
2004 | •• |
| 27530 |
|
Menga J., Timm C. |
CCSP: Secure Intrusion Detection and Safe Implementation Study Guide (642-531 and 642-541) |
2004 • | •• |
| 27537 |
|
Murch R. |
Autonomic Computing |
2004 | •• |
| 27560 |
|
Bucker A. |
Enterprise Security Architecture Using IBM Tivoli Security Solutions |
2004 • | •• |