27262 |
|
Ñèâóõèí Ä.Â. |
Îáùèé êóðñ ôèçèêè. Òîì 2. Òåðìîäèíàìèêà è ìîëåêóëÿðíàÿ ôèçèêà |
2005 • | •• |
27271 |
|
Baker D.L. |
Adobe Acrobat 7 in the Office |
2005 | •• |
27279 |
|
Cohn M. |
Agile Estimating and Planning |
2005 | •• |
27310 |
|
Hook D. |
Beginning Cryptography with Java |
2005 | •• |
27312 |
|
Allen Sh., Terry E. |
Beginning Relational Data Modeling |
2005 • | •• |
27337 |
|
Karp D., Sawyer B. (Ed) |
eBay Hacks |
2005 • | •• |
27346 |
|
Hofmann Ch., Hedtke J., Knous M. |
Firefox and Thunderbird Garage (Garage Series) |
2005 | •• |
27347 |
|
Barnes-Hoggett P., Swann C., Yard T. |
Flash 8 Essentials |
2005 | •• |
27348 |
|
Jacobs S. |
Foundation XML for Flash |
2005 | •• |
27350 |
|
Stankovic R.S. |
Fundamentals of Switching Theory and Logic Design |
2005 • | •• |
27353 |
|
Moskowitz J., Boutell Th. |
Group Policy, Profiles, and IntelliMirror for Windows 2003, Windows XP, and Windows 2000 |
2005 • | •• |
27355 |
|
Vladimirov A., Gavrilenko K., Mikhailovsky A. |
Hacking Exposed Cisco Networks |
2005 • | •• |
27361 |
|
Òþëèíà È.À. (ðåä.), Ñìèðíîâà Í.Í. (ðåä.) |
Ìåõàíèêà â Ìîñêîâñêîì Óíèâåðñèòåòå |
2005 | •• |
27371 |
|
Stallings W. |
Cryptography and Network Security Principles and Practices |
2005 • | •• |
27394 |
|
Smith P.G. |
Linux Network Security (Administrator's Advantage Series) |
2005 | •• |
27401 |
|
Augustine S. |
Managing Agile Projects |
2005 | •• |
27409 |
|
Oppleman V., Friedrichs O., Watson B. |
Extreme Exploits: Advanced Defenses Against Hardcore Hacks |
2005 | •• |
27415 |
|
Otey M., Otey D. |
Microsoft(r) SQL Server(tm) 2005 Developer's Guide |
2005 | •• |
27450 |
|
McClelland D., Fuller R.C. |
Photoshop CS2 Bible |
2005 • | •• |
27454 |
|
Bersinic D., Watson J. |
Oracle Database 10g OCP Certification All-in-One Exam Guide |
2005 • | •• |
27456 |
|
Karl H., Willig A. |
Protocols and Architectures for Wireless Sensor Networks |
2005 • | •• |
27477 |
|
Kaspersky K. |
Shellcoder's Programming Uncovered |
2005 | •• |
27495 |
|
Inc SPSS |
SPSS 14.0 Base User's Guide |
2005 • | •• |
27511 |
|
Leiterman J.C. |
32/64-Bit 80X86 Assembly Language Architecture |
2005 | •• |
27518 |
|
Davis J. |
Adobe Photoshop CS2 One-Click Wow! |
2005 • | •• |
27524 |
|
Keogh J. |
ASP. Net 2.0 Demystified |
2005 • | •• |
27529 |
|
Behtash B., Moerschel G. |
CCSP Flash Cards and Exam Practice Pack |
2005 | •• |
27538 |
|
Gardner S., Krug K. |
BitTorrent For Dummies |
2005 | •• |
27555 |
|
Miller M. |
Easy Computer Basics |
2005 | •• |
27557 |
|
Raghavan P., Lad A., Neelakandan S. |
Embedded Linux System Design and Development |
2005 | •• |
27558 |
|
Tilborg H.C. (Ed) |
Encyclopedia of Cryptography and Security |
2005 • | •• |
27561 |
|
Kabatiansky G., Krouk E., Semenov S. |
Error Correcting Coding and Security for Data Networks: Analysis of the Superchannel Concept |
2005 | •• |
27567 |
|
Peters K. |
Foundation ActionScript: Animation: Making Things Move |
2005 | •• |
27569 |
|
Press M. |
Geek House: 10 Hardware Hacking Projects for around Home |
2005 | •• |
27573 |
|
Flenov M. |
Hacker Linux Uncovered |
2005 | •• |
27574 |
|
Nizamutdinov M. |
Hacker Web Exploition Uncovered |
2005 | •• |
27623 |
|
Finkelstein E. |
AutoCAD 2006 and AutoCAD LT 2006 Bible |
2005 • | •• |
27643 |
|
Noel M. |
Microsoft Internet Security and Acceleration (ISA) Server 2004 Unleashed |
2005 | •• |
27655 |
|
Buyens J. |
Microsoft Windows SharePoint Services Inside Out |
2005 | •• |
27670 |
|
Kratzer T., Korte E. |
NOVELL GroupWise 7 Administrator Solutions Guide |
2005 | •• |
27673 |
|
Salleh Sh., Zomaya A.Y., Olariu S. |
Numerical Simulations and Case Studies Using Visual C++. Net |
2005 | •• |
27693 |
|
Homer A., Anderson R., Howard R. |
Professional ASP.NET 1.0, Special Edition |
2005 • | •• |
27701 |
|
Kochan S.G. |
Programming in C: A Complete Introduction to the C Programming Language |
2005 • | •• |
27703 |
|
Esposito D. |
Programming Microsoft ASP.Net 2.0 Core Reference |
2005 | •• |
27707 |
|
Stenholm S., Suominen K.-A. |
Quantum Approach to Informatics |
2005 | •• |
27709 |
|
Barkakati N. |
Red Hat Linux Fedora Secrets |
2005 | •• |
27737 |
|
Zalewski M. |
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks |
2005 • | •• |
27765 |
|
Microsoft Press |
Testing . Net Application Blocks |
2005 | •• |
27777 |
|
Litchfield D., Grindlay B., Anley Ch. |
Database Hacker's Handbook: Defending Database Servers |
2005 | •• |
27781 |
|
Li M., Baker M. |
Grid: Core Technologies |
2005 • | •• |