| 27346 |
|
Hofmann Ch., Hedtke J., Knous M. |
Firefox and Thunderbird Garage (Garage Series) |
2005 | •• |
| 27347 |
|
Barnes-Hoggett P., Swann C., Yard T. |
Flash 8 Essentials |
2005 | •• |
| 27348 |
|
Jacobs S. |
Foundation XML for Flash |
2005 | •• |
| 27350 |
|
Stankovic R.S. |
Fundamentals of Switching Theory and Logic Design |
2005 • | •• |
| 27353 |
|
Moskowitz J., Boutell Th. |
Group Policy, Profiles, and IntelliMirror for Windows 2003, Windows XP, and Windows 2000 |
2005 • | •• |
| 27355 |
|
Vladimirov A., Gavrilenko K., Mikhailovsky A. |
Hacking Exposed Cisco Networks |
2005 • | •• |
| 27361 |
|
Òþëèíà È.À. (ðåä.), Ñìèðíîâà Í.Í. (ðåä.) |
Ìåõàíèêà â Ìîñêîâñêîì Óíèâåðñèòåòå |
2005 | •• |
| 27371 |
|
Stallings W. |
Cryptography and Network Security Principles and Practices |
2005 • | •• |
| 27394 |
|
Smith P.G. |
Linux Network Security (Administrator's Advantage Series) |
2005 | •• |
| 27401 |
|
Augustine S. |
Managing Agile Projects |
2005 | •• |
| 27409 |
|
Oppleman V., Friedrichs O., Watson B. |
Extreme Exploits: Advanced Defenses Against Hardcore Hacks |
2005 | •• |
| 27415 |
|
Otey M., Otey D. |
Microsoft(r) SQL Server(tm) 2005 Developer's Guide |
2005 | •• |
| 27450 |
|
McClelland D., Fuller R.C. |
Photoshop CS2 Bible |
2005 • | •• |
| 27454 |
|
Bersinic D., Watson J. |
Oracle Database 10g OCP Certification All-in-One Exam Guide |
2005 • | •• |
| 27456 |
|
Karl H., Willig A. |
Protocols and Architectures for Wireless Sensor Networks |
2005 • | •• |
| 27477 |
|
Kaspersky K. |
Shellcoder's Programming Uncovered |
2005 | •• |
| 27495 |
|
Inc SPSS |
SPSS 14.0 Base User's Guide |
2005 • | •• |
| 27511 |
|
Leiterman J.C. |
32/64-Bit 80X86 Assembly Language Architecture |
2005 | •• |
| 27518 |
|
Davis J. |
Adobe Photoshop CS2 One-Click Wow! |
2005 • | •• |
| 27524 |
|
Keogh J. |
ASP. Net 2.0 Demystified |
2005 • | •• |
| 27529 |
|
Behtash B., Moerschel G. |
CCSP Flash Cards and Exam Practice Pack |
2005 | •• |
| 27538 |
|
Gardner S., Krug K. |
BitTorrent For Dummies |
2005 | •• |
| 27555 |
|
Miller M. |
Easy Computer Basics |
2005 | •• |
| 27557 |
|
Raghavan P., Lad A., Neelakandan S. |
Embedded Linux System Design and Development |
2005 | •• |
| 27558 |
|
Tilborg H.C. (Ed) |
Encyclopedia of Cryptography and Security |
2005 • | •• |
| 27561 |
|
Kabatiansky G., Krouk E., Semenov S. |
Error Correcting Coding and Security for Data Networks: Analysis of the Superchannel Concept |
2005 | •• |
| 27567 |
|
Peters K. |
Foundation ActionScript: Animation: Making Things Move |
2005 | •• |
| 27569 |
|
Press M. |
Geek House: 10 Hardware Hacking Projects for around Home |
2005 | •• |
| 27573 |
|
Flenov M. |
Hacker Linux Uncovered |
2005 | •• |
| 27574 |
|
Nizamutdinov M. |
Hacker Web Exploition Uncovered |
2005 | •• |
| 27623 |
|
Finkelstein E. |
AutoCAD 2006 and AutoCAD LT 2006 Bible |
2005 • | •• |
| 27643 |
|
Noel M. |
Microsoft Internet Security and Acceleration (ISA) Server 2004 Unleashed |
2005 | •• |
| 27655 |
|
Buyens J. |
Microsoft Windows SharePoint Services Inside Out |
2005 | •• |
| 27670 |
|
Kratzer T., Korte E. |
NOVELL GroupWise 7 Administrator Solutions Guide |
2005 | •• |
| 27673 |
|
Salleh Sh., Zomaya A.Y., Olariu S. |
Numerical Simulations and Case Studies Using Visual C++. Net |
2005 | •• |
| 27693 |
|
Homer A., Anderson R., Howard R. |
Professional ASP.NET 1.0, Special Edition |
2005 • | •• |
| 27701 |
|
Kochan S.G. |
Programming in C: A Complete Introduction to the C Programming Language |
2005 • | •• |
| 27703 |
|
Esposito D. |
Programming Microsoft ASP.Net 2.0 Core Reference |
2005 | •• |
| 27707 |
|
Stenholm S., Suominen K.-A. |
Quantum Approach to Informatics |
2005 | •• |
| 27709 |
|
Barkakati N. |
Red Hat Linux Fedora Secrets |
2005 | •• |
| 27737 |
|
Zalewski M. |
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks |
2005 • | •• |
| 27765 |
|
Microsoft Press |
Testing . Net Application Blocks |
2005 | •• |
| 27777 |
|
Litchfield D., Grindlay B., Anley Ch. |
Database Hacker's Handbook: Defending Database Servers |
2005 | •• |
| 27781 |
|
Li M., Baker M. |
Grid: Core Technologies |
2005 • | •• |
| 27784 |
|
Romm J. |
The Hype about Hydrogen: Fact and Fiction in the Race to Save the Climate |
2005 | •• |
| 27790 |
|
Feitelberg S. |
Net Worth Workout: A Powerful Program for a Lifetime of Financial Fitness |
2005 | •• |
| 27799 |
|
Howard M., LeBlanc D., Viega J. |
19 Deadly Sins of Software Security: Programming Flaws and How to Fix Them |
2005 | •• |
| 27803 |
|
Sobell M.G. |
A Practical Guide to Linux® Commands, Editors, and Shell Programming |
2005 | •• |
| 27809 |
|
Kluge W. |
Abstract Computing Machines |
2005 | •• |
| 27812 |
|
Hunter L.E. |
Active Directory Field Guide |
2005 | •• |