28294 |
|
Burnett M., Kleiman D. |
Perfect Passwords |
2005 | •• |
28309 |
|
Mittal K., Kanchanavally S. |
Pro Apache Beehive |
2005 | •• |
28312 |
|
Linwood J., Minter D. |
Pro Hibernate 3 |
2005 | •• |
28313 |
|
Virkus R. |
Pro J2ME Polish |
2005 | •• |
28314 |
|
Curran D., Ferracchiati F.C., Gilani S.F. |
Pro .NET 1.1 Remoting, Reflection, and Threading |
2005 | •• |
28318 |
|
Foley R., Lester A. |
Pro Perl Debugging |
2005 | •• |
28319 |
|
Wainwright P. |
Pro Perl |
2005 | •• |
28343 |
|
Gilbert J. |
QuickBooks 2005 Bible, Desktop Edition |
2005 | •• |
28355 |
|
Good N.A. |
Regular Expression Recipes for Windows Developers: A Problem-Solution Approach |
2005 | •• |
28372 |
|
Weippl E.R. |
Security in e-learning |
2005 | •• |
28380 |
|
Johnson C.F.A. |
Shell Scripting Recipes: A Problem-Solution Approach |
2005 | •• |
28381 |
|
Richardson R., Gwaltney W. |
Ship it! A Practical Guide to Successful Software Projects |
2005 | •• |
28386 |
|
Chern S.-S., Shen Z. |
Riemann-Finsler Geometry |
2005 | •• |
28393 |
|
Âîðîíîâà Í.Â. |
Àíàòîìèÿ öåíòðàëüíîé íåðâîíîé ñèñòåìû |
2005 | •• |
28402 |
|
Ïåíðîóç Ð. |
Òåíè ðàçóìà. Â ïîèñêàõ íàóêè î ñîçíàíèè |
2005 | •• |
28421 |
|
Morrison R., Oquendo F. |
Software Architecture : 2nd European Workshop, EWSA 2005, Pisa, Italy, June 13-14, 2005, Proceedings |
2005 | •• |
28423 |
|
Craig P. |
Software Piracy Exposed |
2005 | •• |
28424 |
|
Acuna S.T., Juristo N. |
Software process modeling |
2005 | •• |
28425 |
|
Pohl K., Böckle G., van der Linden F.J. |
Software Product Line Engineering: Foundations, Principles and Techniques |
2005 | •• |
28431 |
|
Ducasse S. |
Squeak: Learn Programming with Robots |
2005 | •• |
28432 |
|
Mullen T., Russel R., Eller R. |
Stealing the Network : How to Own an Identity |
2005 | •• |
28433 |
|
Chaudhry N., Shaw K., Abdelguerfi M. |
Stream data management |
2005 | •• |
28447 |
|
Beydeda S., Gruhn V. |
Testing Commercial-off-the-Shelf Components and Systems |
2005 | •• |
28451 |
|
Spolsky J. |
The Best Software Writing I |
2005 | •• |
28458 |
|
Krafft M. |
The Debian System |
2005 | •• |
28460 |
|
Zukowski J. |
The Definitive Guide to Java Swing |
2005 • | •• |
28469 |
|
Sripimanwat K. (Ed) |
Turbo Code Applications: A Journey from a Paper to Realization |
2005 • | •• |
28473 |
|
Horst B. |
The Tiny Guide to OpenOffice.org |
2005 | •• |
28478 |
|
Coggeshall J., Tabini M. |
The Zend PHP Certification Practice Test Book: Practice Questions for the Zend Certified Engineer Exam |
2005 | •• |
28479 |
|
Lee H.K. |
Understanding IPv6 |
2005 | •• |
28480 |
|
Sands D. |
Understanding Intrusion Detection Through Visualization |
2005 • | •• |
28481 |
|
Anderson J.B., Johnnesson R. |
Understanding Information Transmission |
2005 • | •• |
28490 |
|
Benyen Ch. |
Understanding Linux Network Internals |
2005 | •• |
28498 |
|
Biffl S. (Ed), Boehm B. (Ed), Erdogmus H. (Ed) |
Value-Based Software Engineering |
2005 • | •• |
28502 |
|
Mills B. |
Theoretical Introduction to Programming |
2005 | •• |
28505 |
|
Zhou S.K., Chellappa R., Zhao W. |
Unconstrained face recognition |
2005 | •• |
28512 |
|
Mueller S., Knittel B. |
Upgrading and Repairing Microsoft Windows |
2005 | •• |
28516 |
|
Hassel J. |
Using Microsoft Windows Small Business Server 2003 |
2005 | •• |
28523 |
|
Jekosch U. |
Voice and Speech Quality Perception: Assessment and Evaluation |
2005 • | •• |
28524 |
|
Wolf Ch., Halter E.M. |
Virtualization: From the Desktop to the Enterprise |
2005 | •• |
28550 |
|
Wang L.K. (ed.), Hung Y.-T. (ed.), Lo H.H. (ed.) |
Waste Treatment in the Process Industries |
2005 | •• |
28561 |
|
Moskowitz J., Boutell T. |
Windows and Linux Integration: Hands-on Solutions for a Mixed Environment |
2005 | •• |
28568 |
|
Allen R., Danseglio M. |
Windows Server 2003 Security Cookbook |
2005 | •• |
28582 |
|
Comaniciu C., Mandayam N.B., Poor H.V. |
Wireless networks |
2005 | •• |
28585 |
|
Eren H. |
Wireless Sensors and Instruments |
2005 | •• |
28596 |
|
Cerami E. |
XML for bioinformatics |
2005 | •• |
28614 |
|
Ïåðêèíñ Äæ. |
Èñïîâåäü ýêîíîìè÷åñêîãî óáèéöû |
2005 | •• |
28711 |
|
Baker B. |
A Baker's dozen: real analog solutions for digital designers |
2005 | •• |
28712 |
|
Baigneres T., Junod P., Lu Y. |
A Classical Introduction to Cryptography Exercise Book |
2005 | •• |
28636 |
|
Caromel D., Henrio L. |
Theory of Distributed Objects: A Practical Framework for Reasoning about Asynchronous Communications, Determinism, Mobility, and Components |
2005 | •• |