| 24965 |
|
Kandlikar S.G., King M.R., Li D. |
Heat Transfer and Fluid Flow in Minichannels and Microchannels |
2005 | •• |
| 24968 |
|
Lappa M. |
Fluids, Materials and Microgravity: Numerical Techniques and Insights into the Physics |
2005 | •• |
| 24978 |
|
Gabbay D.M. (ed.), Guenthner F. (ed.) |
Handbook of Philosophical Logic (Volume 12) |
2005 • | •• |
| 24979 |
|
Gabbay D.M. (ed.), Guenthner F. (ed.) |
Handbook of Philosophical Logic (Volume 13) |
2005 • | •• |
| 24986 |
|
Grattan-Guiness I. (ed.) |
Landmark Writings in Western Mathematics 1640-1940 |
2005 | •• |
| 24990 |
|
Bobrowski A. |
Functional Analysis for Probability and Stochastic Processes |
2005 | •• |
| 24991 |
|
Êîðîòàåâ À.Â., Ìàëêîâ À.Ñ., Õàëòóðèíà Ä.À. |
Çàêîíû èñòîðèè. Ìàòåìàòè÷åñêîå ìîäåëèðîâàíèå èñòîðè÷åñêèõ ìàêðîïðîöåññîâ. Äåìîãðàôèÿ, ýêîíîìèêà, âîéíû |
2005 | •• |
| 24996 |
|
Åðîõèí Ì.Í. (ðåä.) |
Äåòàëè ìàøèí è îñíîâû êîíñòðóèðîâàíèÿ |
2005 | •• |
| 25017 |
|
Turkle Sh. |
The Second Self: Computers and the Human Spirit - Twentieth Anniversary Edition |
2005 | •• |
| 25018 |
|
Reuvid J. |
The Secure Online Business Handbook: E-commerce, IT Functionality and Business Continuity |
2005 • | •• |
| 25020 |
|
Prandi M. |
The Unofficial Guide to Managing Rental Property (Unofficial Guides Series) |
2005 | •• |
| 25022 |
|
Santi P. |
Topology Control in Wireless Ad Hoc and Sensor Networks |
2005 | •• |
| 25024 |
|
Ghenassia F. |
Transaction Level Modelling Methodology |
2005 | •• |
| 25029 |
|
Bernstein L., Yuhas C.M. |
Trustworthy Systems Through Quantitative Software Engineering |
2005 • | •• |
| 25030 |
|
Nekoogar F. |
ULTRA Wideband Communications: Fundamentals and Application |
2005 • | •• |
| 25035 |
|
El-Ghazawi T., Carlson W., Sterling Th. |
Upc: Distributed Shared Memory Programming |
2005 • | •• |
| 25038 |
|
Unhelkar Bh. |
Verification and Validation for Quality of Uml 2. 0 Models |
2005 | •• |
| 25040 |
|
Stephens R. |
Visual Basic 2005 Programmer's Reference |
2005 | •• |
| 25051 |
|
Lin Y.-B., Pang A.-Ch. |
Wireless and Mobile All-IP Networks |
2005 | •• |
| 25052 |
|
Ahmad A. |
Wireless and Mobile Data Networks |
2005 • | •• |
| 25054 |
|
Briere D.D., Hurley P., Hurley P.J. |
Wireless Network Hacks and Mods for Dummies |
2005 | •• |
| 25065 |
|
Bulusu N., Jha S. |
Wireless Sensor Networks |
2005 | •• |
| 25072 |
|
Luo F.L., Ye H. |
Essential DC/DC Converters |
2005 | •• |
| 25076 |
|
Shung K.K. |
Diagnostic Ultrasound: Imaging and Blood Flow Measurements |
2005 | •• |
| 25085 |
|
Oppliger R. |
Contemporary Cryptography |
2005 | •• |
| 25090 |
|
Säckinger E. |
Broadband Circuits for Optical Fiber Communication |
2005 | •• |
| 25094 |
|
Glushko R.J., McGrath T. |
Document Engineering: Analyzing and Designing Documents for Business Informatics and Web Services |
2005 | •• |
| 25099 |
|
Harbour J.S. |
Beginning Game Programming |
2005 | •• |
| 25105 |
|
Clarke I., Flaherty T.B. |
Advances in Electronic Marketing |
2005 | •• |
| 25106 |
|
Hunt J. |
Agile Software Construction |
2005 | •• |
| 25124 |
|
Francus P. |
Image Analysis, Sediments and Paleoenvironments |
2005 | •• |
| 25131 |
|
Ye J., Cundiff S.T. |
Femtosecond Optical Frequency Comb Technology: Principle, Operation and Applications |
2005 | •• |
| 25135 |
|
IT Governance Institute |
Governance of the Extended Enterprise: Bridging Business and IT Strategies |
2005 | •• |
| 25144 |
|
Eckert J., Schitka M.J. |
Linux+ 2005 In Depth |
2005 | •• |
| 25147 |
|
Lachev T. |
Microsoft Reporting Services in Action |
2005 | •• |
| 25151 |
|
MySQL AB |
MySQL Language Reference |
2005 | •• |
| 25153 |
|
Gaiti D., Galmes S., Puigjaner R. (eds.) |
Network Control and Engineering for QOS, Security and Mobility, III |
2005 | •• |
| 25154 |
|
Kaufman A.S., Lichtenberger E.O., Fletcher-Janzen E. |
Essentials of KABC-II Assessment |
2005 | •• |
| 25160 |
|
Jue J.P., Vokkarane V.M. |
Optical Burst Switched Networks |
2005 | •• |
| 25161 |
|
Cusumano M., Shirky C., Feller J. |
Perspectives on Free and Open Source Software |
2005 | •• |
| 25162 |
|
James L. |
Phishing Exposed |
2005 | •• |
| 25165 |
|
Robinson P., Vogt H., Wagealla W. |
Privacy, Security and Trust within the Context of Pervasive Computing |
2005 | •• |
| 25174 |
|
Bundy A., Basin D., Hutter D. |
Rippling: Meta-Level Guidance for Mathematical Reasoning |
2005 | •• |
| 25176 |
|
Sutcliffe N., Nakayama M. |
Managing It Skills Portfolios: Planning, Acquisition and Performance Evaluation |
2005 | •• |
| 25179 |
|
Johnson R.S. |
Singular Perturbation Theory: Mathematical and Analytical Techniques with Applications to Engineering |
2005 | •• |
| 25182 |
|
Gottschalk P. |
Strategic Knowledge Management Technology |
2005 | •• |
| 25189 |
|
Tzfira T., Citovsky V. |
Nuclear Import and Export in Plants and Animals |
2005 | •• |
| 25195 |
|
Berger T.W., Glanzman D.L. (eds.) |
Toward Replacement Parts for the Brain: Implantable Biomimetic Electronics as Neural Prostheses |
2005 | •• |
| 25209 |
|
Premier Development, Skelnik Ch., Gibbs V. |
Roland VS Recorder Power! |
2005 | •• |
| 25213 |
|
Kaveney R. |
From Alien to The Matrix: Reading Science Fiction Film |
2005 | •• |