27456 |
|
Karl H., Willig A. |
Protocols and Architectures for Wireless Sensor Networks |
2005 • | •• |
27477 |
|
Kaspersky K. |
Shellcoder's Programming Uncovered |
2005 | •• |
27495 |
|
Inc SPSS |
SPSS 14.0 Base User's Guide |
2005 • | •• |
27511 |
|
Leiterman J.C. |
32/64-Bit 80X86 Assembly Language Architecture |
2005 | •• |
27518 |
|
Davis J. |
Adobe Photoshop CS2 One-Click Wow! |
2005 • | •• |
27524 |
|
Keogh J. |
ASP. Net 2.0 Demystified |
2005 • | •• |
27529 |
|
Behtash B., Moerschel G. |
CCSP Flash Cards and Exam Practice Pack |
2005 | •• |
27538 |
|
Gardner S., Krug K. |
BitTorrent For Dummies |
2005 | •• |
27555 |
|
Miller M. |
Easy Computer Basics |
2005 | •• |
27557 |
|
Raghavan P., Lad A., Neelakandan S. |
Embedded Linux System Design and Development |
2005 | •• |
27558 |
|
Tilborg H.C. (Ed) |
Encyclopedia of Cryptography and Security |
2005 • | •• |
27561 |
|
Kabatiansky G., Krouk E., Semenov S. |
Error Correcting Coding and Security for Data Networks: Analysis of the Superchannel Concept |
2005 | •• |
27567 |
|
Peters K. |
Foundation ActionScript: Animation: Making Things Move |
2005 | •• |
27569 |
|
Press M. |
Geek House: 10 Hardware Hacking Projects for around Home |
2005 | •• |
27573 |
|
Flenov M. |
Hacker Linux Uncovered |
2005 | •• |
27574 |
|
Nizamutdinov M. |
Hacker Web Exploition Uncovered |
2005 | •• |
27623 |
|
Finkelstein E. |
AutoCAD 2006 and AutoCAD LT 2006 Bible |
2005 • | •• |
27643 |
|
Noel M. |
Microsoft Internet Security and Acceleration (ISA) Server 2004 Unleashed |
2005 | •• |
27655 |
|
Buyens J. |
Microsoft Windows SharePoint Services Inside Out |
2005 | •• |
27670 |
|
Kratzer T., Korte E. |
NOVELL GroupWise 7 Administrator Solutions Guide |
2005 | •• |
27673 |
|
Salleh Sh., Zomaya A.Y., Olariu S. |
Numerical Simulations and Case Studies Using Visual C++. Net |
2005 | •• |
27693 |
|
Homer A., Anderson R., Howard R. |
Professional ASP.NET 1.0, Special Edition |
2005 • | •• |
27701 |
|
Kochan S.G. |
Programming in C: A Complete Introduction to the C Programming Language |
2005 • | •• |
27703 |
|
Esposito D. |
Programming Microsoft ASP.Net 2.0 Core Reference |
2005 | •• |
27707 |
|
Stenholm S., Suominen K.-A. |
Quantum Approach to Informatics |
2005 | •• |
27709 |
|
Barkakati N. |
Red Hat Linux Fedora Secrets |
2005 | •• |
27737 |
|
Zalewski M. |
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks |
2005 • | •• |
27765 |
|
Microsoft Press |
Testing . Net Application Blocks |
2005 | •• |
27777 |
|
Litchfield D., Grindlay B., Anley Ch. |
Database Hacker's Handbook: Defending Database Servers |
2005 | •• |
27781 |
|
Li M., Baker M. |
Grid: Core Technologies |
2005 • | •• |
27784 |
|
Romm J. |
The Hype about Hydrogen: Fact and Fiction in the Race to Save the Climate |
2005 | •• |
27790 |
|
Feitelberg S. |
Net Worth Workout: A Powerful Program for a Lifetime of Financial Fitness |
2005 | •• |
27799 |
|
Howard M., LeBlanc D., Viega J. |
19 Deadly Sins of Software Security: Programming Flaws and How to Fix Them |
2005 | •• |
27803 |
|
Sobell M.G. |
A Practical Guide to Linux® Commands, Editors, and Shell Programming |
2005 | •• |
27809 |
|
Kluge W. |
Abstract Computing Machines |
2005 | •• |
27812 |
|
Hunter L.E. |
Active Directory Field Guide |
2005 | •• |
27821 |
|
Dobbertin H. (ed.), Rijmen V. (ed.), Sowa A. (ed.) |
Advanced Encryption Standard - AES: 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers |
2005 | •• |
27824 |
|
Rammer I., Szpuszta M. |
Advanced .NET Remoting |
2005 • | •• |
27841 |
|
Otto S.R., Denier J.P. |
An Introduction to Programming and Numerical Methods in MATLAB |
2005 | •• |
27846 |
|
Gunther N.J. |
Analyzing Computer Systems Performance |
2005 | •• |
27850 |
|
Jalote P. |
An integrated approach to software engineering |
2005 • | •• |
27857 |
|
Adamatzky A., Komosinski M. |
Artificial Life Models in Software |
2005 | •• |
27858 |
|
Hoya T. |
Artificial Mind System: Kernel Memory Approach |
2005 | •• |
27867 |
|
Li S., Knudsen J. |
Beginning J2ME: From Novice to Professional |
2005 • | •• |
27868 |
|
Barker J. |
Beginning Java Objects |
2005 • | •• |
27872 |
|
Rothman J., Derby E. |
Behind Closed Doors |
2005 | •• |
27884 |
|
Gomillion D., Dempster B. |
Building Telephony Systems with Asterisk |
2005 | •• |
27897 |
|
Rothe J. |
Complexity Theory and Cryptology: An Introduction to Cryptocomplexity |
2005 | •• |
27905 |
|
Zhang H. |
Computer Graphics Using Java 2D and 3D |
2005 | •• |
27906 |
|
Kizza J.M. |
Computer Network Security |
2005 • | •• |