27908 |
|
Lee D.T., Tygar J.D., Shieh S.P. (Ed) |
Computer Security in the 21st Century |
2005 | •• |
27919 |
|
Rodarmor W., Crete D., Daveau G. |
Creating Photomontages with Photoshop: A Designer's Notebook |
2005 • | •• |
27923 |
|
Welschenbach M., Kramer D. |
Cryptography in C and C++ |
2005 • | •• |
27934 |
|
Drake P. |
Data Structures and Algorithms in Java |
2005 • | •• |
27954 |
|
Minutella D., Cioara J., Stevenson H. |
CCNA® Exam Prep™ (Exam 640-801) |
2005 | •• |
27955 |
|
Edwards W., Jack T., Lammle T. |
CCNP: Complete Study Guide |
2005 | •• |
27963 |
|
Salomon D. |
Coding for data and computer communications |
2005 | •• |
27970 |
|
Tidwell J. |
Designing Interfaces |
2005 | •• |
27979 |
|
Veeravalli B., Barlas G. |
Distributed Multimedia Retrieval Strategies for Large Scale Networked Systems |
2005 | •• |
27980 |
|
Keith J. |
DOM Scripting |
2005 | •• |
27987 |
|
Killpack R. |
eDirectory Field Guide |
2005 | •• |
28007 |
|
Selly D., Barnaby T., Troelsen A. |
Expert ASP.NET 2.0 Advanced Application Design |
2005 | •• |
28009 |
|
Salomon D. |
Foundations of Computer Security |
2005 | •• |
28018 |
|
Ma Z. |
Fuzzy Database Modeling with XML |
2005 | •• |
28019 |
|
Bhangal Sh., Besley K. |
Foundation Flash 8 |
2005 | •• |
28038 |
|
Gunther N.J. |
Guerilla Capacity Planning |
2005 • | •• |
28041 |
|
Menon R.M., Davis T. (Ed) |
Expert Oracle JDBC Programming: High Performance Applications with Oracle 10g |
2005 | •• |
28046 |
|
Cheng Ch., Rahimzadeh A. |
Hacking Digital Cameras |
2005 | •• |
28048 |
|
Holmes M. |
Expert .NET Delivery Using NAnt and CruiseControl.NET |
2005 | •• |
28049 |
|
Rybakzyk P. |
Expert Network Time Protocol: An Experience in Time with NTP |
2005 | •• |
28056 |
|
Bezdek J.C., Keller J., Krisnapuram R. |
Fuzzy Models and Algorithms for Pattern Recognition and Image Processing |
2005 | •• |
28061 |
|
Yu T., Riolo R., Worzel B. |
Genetic Programming Theory and Practice III |
2005 | •• |
28064 |
|
Boukerche A. |
Handbook of Algorithms for Wireless Networking and Mobile Computing |
2005 | •• |
28069 |
|
Freeman E., Freeman E. |
Head First HTML with CSS & XHTML |
2005 | •• |
28078 |
|
Blake B., Sahlin D. |
How to do everything with Macromedia Flash |
2005 | •• |
28079 |
|
Hall R., Ball D., Shilmover B. |
How to Do Everything with Your Dell Axim Handheld |
2005 • | •• |
28080 |
|
Seffah A. (ed.), Gulliksen J., Desmarais M.C. |
Human-Centered Software Engineering - Integrating Usability in the Software Development Lifecycle |
2005 | •• |
28081 |
|
Motta G. (ed.), Rizzo F. (ed.), Storer J.A. (ed.) |
Hyperspectral data compression |
2005 | •• |
28090 |
|
Courtney J.F. (ed.), Haynes J.D. (ed.), Paradice D.B. (ed.) |
Inquiring Organizations |
2005 | •• |
28109 |
|
Anthony G. |
Iterating Infusion |
2005 | •• |
28124 |
|
Educational Testing Service |
TOEFL iBT |
2005 | •• |
28129 |
|
Spencer D.W., Sebastian R. |
Understanding IBM Workplace Strategy and Products: Featuring Lotus Workplace |
2005 | •• |
28150 |
|
Fehily C. |
Windows XP: Visual Quickstart Guide |
2005 • | •• |
28169 |
|
Mann K.D. |
JavaServer Faces in Action |
2005 | •• |
28194 |
|
Bramer M. |
Logic Programming with Prolog |
2005 | •• |
28197 |
|
Maloof M.A. (ed.) |
Machine Learning and Data Mining for Computer Security: Methods and Applications |
2005 | •• |
28198 |
|
Apolloni B. (ed.), Ghosh A. (ed.), Patnaik S. (ed.) |
Machine Learning and Robot Perception |
2005 | •• |
28203 |
|
Khan K., Zheng Y. |
Managing Corporate Information Systems Evolution and Maintenance |
2005 | •• |
28204 |
|
Kumar V., Srivastava J., Lazarevic A. |
Managing cyber threats |
2005 | •• |
28216 |
|
Vince J. |
Mathematics for Computer Graphics |
2005 • | •• |
28221 |
|
Chen H., Fuller S.S., Friedman C. |
Medical Informatics: Knowledge Management and Data Mining in Biomedicine |
2005 | •• |
28238 |
|
Kneht-Thurmann S. |
Windows Small Business Server SBS 2003 |
2005 | •• |
28243 |
|
Buyens J. |
Microsoft Visual Web Developer |
2005 | •• |
28250 |
|
Andriessen J.H.E. (ed.), Vartiainen M. (ed.) |
Mobile Virtual Work |
2005 | •• |
28256 |
|
Lu C.-S. |
Multimedia Security: : Steganography and Digital Watermarking Techniques for Protection of Intellectual Property |
2005 | •• |
28276 |
|
Dargan P.A. |
Open Systems And Standards For Software Product Development |
2005 | •• |
28277 |
|
Seddon C. |
OpenGL Game Development |
2005 | •• |
28284 |
|
Caruso K., Potter B., Long J. |
OS X for Hackers at Heart |
2005 | •• |
28286 |
|
Gunderloy M. |
Painless Project Management with FogBugz |
2005 | •• |
28292 |
|
Bass S. |
PC Annoyances |
2005 • | •• |