| 28198 |
|
Apolloni B. (ed.), Ghosh A. (ed.), Patnaik S. (ed.) |
Machine Learning and Robot Perception |
2005 | •• |
| 28203 |
|
Khan K., Zheng Y. |
Managing Corporate Information Systems Evolution and Maintenance |
2005 | •• |
| 28204 |
|
Kumar V., Srivastava J., Lazarevic A. |
Managing cyber threats |
2005 | •• |
| 28216 |
|
Vince J. |
Mathematics for Computer Graphics |
2005 • | •• |
| 28221 |
|
Chen H., Fuller S.S., Friedman C. |
Medical Informatics: Knowledge Management and Data Mining in Biomedicine |
2005 | •• |
| 28238 |
|
Kneht-Thurmann S. |
Windows Small Business Server SBS 2003 |
2005 | •• |
| 28243 |
|
Buyens J. |
Microsoft Visual Web Developer |
2005 | •• |
| 28250 |
|
Andriessen J.H.E. (ed.), Vartiainen M. (ed.) |
Mobile Virtual Work |
2005 | •• |
| 28256 |
|
Lu C.-S. |
Multimedia Security: : Steganography and Digital Watermarking Techniques for Protection of Intellectual Property |
2005 | •• |
| 28276 |
|
Dargan P.A. |
Open Systems And Standards For Software Product Development |
2005 | •• |
| 28277 |
|
Seddon C. |
OpenGL Game Development |
2005 | •• |
| 28284 |
|
Caruso K., Potter B., Long J. |
OS X for Hackers at Heart |
2005 | •• |
| 28286 |
|
Gunderloy M. |
Painless Project Management with FogBugz |
2005 | •• |
| 28292 |
|
Bass S. |
PC Annoyances |
2005 • | •• |
| 28294 |
|
Burnett M., Kleiman D. |
Perfect Passwords |
2005 | •• |
| 28309 |
|
Mittal K., Kanchanavally S. |
Pro Apache Beehive |
2005 | •• |
| 28312 |
|
Linwood J., Minter D. |
Pro Hibernate 3 |
2005 | •• |
| 28313 |
|
Virkus R. |
Pro J2ME Polish |
2005 | •• |
| 28314 |
|
Curran D., Ferracchiati F.C., Gilani S.F. |
Pro .NET 1.1 Remoting, Reflection, and Threading |
2005 | •• |
| 28318 |
|
Foley R., Lester A. |
Pro Perl Debugging |
2005 | •• |
| 28319 |
|
Wainwright P. |
Pro Perl |
2005 | •• |
| 28343 |
|
Gilbert J. |
QuickBooks 2005 Bible, Desktop Edition |
2005 | •• |
| 28355 |
|
Good N.A. |
Regular Expression Recipes for Windows Developers: A Problem-Solution Approach |
2005 | •• |
| 28372 |
|
Weippl E.R. |
Security in e-learning |
2005 | •• |
| 28380 |
|
Johnson C.F.A. |
Shell Scripting Recipes: A Problem-Solution Approach |
2005 | •• |
| 28381 |
|
Richardson R., Gwaltney W. |
Ship it! A Practical Guide to Successful Software Projects |
2005 | •• |
| 28386 |
|
Chern S.-S., Shen Z. |
Riemann-Finsler Geometry |
2005 | •• |
| 28393 |
|
Âîðîíîâà Í.Â. |
Àíàòîìèÿ öåíòðàëüíîé íåðâîíîé ñèñòåìû |
2005 | •• |
| 28402 |
|
Ïåíðîóç Ð. |
Òåíè ðàçóìà. Â ïîèñêàõ íàóêè î ñîçíàíèè |
2005 | •• |
| 28421 |
|
Morrison R., Oquendo F. |
Software Architecture : 2nd European Workshop, EWSA 2005, Pisa, Italy, June 13-14, 2005, Proceedings |
2005 | •• |
| 28423 |
|
Craig P. |
Software Piracy Exposed |
2005 | •• |
| 28424 |
|
Acuna S.T., Juristo N. |
Software process modeling |
2005 | •• |
| 28425 |
|
Pohl K., Böckle G., van der Linden F.J. |
Software Product Line Engineering: Foundations, Principles and Techniques |
2005 | •• |
| 28431 |
|
Ducasse S. |
Squeak: Learn Programming with Robots |
2005 | •• |
| 28432 |
|
Mullen T., Russel R., Eller R. |
Stealing the Network : How to Own an Identity |
2005 | •• |
| 28433 |
|
Chaudhry N., Shaw K., Abdelguerfi M. |
Stream data management |
2005 | •• |
| 28447 |
|
Beydeda S., Gruhn V. |
Testing Commercial-off-the-Shelf Components and Systems |
2005 | •• |
| 28451 |
|
Spolsky J. |
The Best Software Writing I |
2005 | •• |
| 28458 |
|
Krafft M. |
The Debian System |
2005 | •• |
| 28460 |
|
Zukowski J. |
The Definitive Guide to Java Swing |
2005 • | •• |
| 28469 |
|
Sripimanwat K. (Ed) |
Turbo Code Applications: A Journey from a Paper to Realization |
2005 • | •• |
| 28473 |
|
Horst B. |
The Tiny Guide to OpenOffice.org |
2005 | •• |
| 28478 |
|
Coggeshall J., Tabini M. |
The Zend PHP Certification Practice Test Book: Practice Questions for the Zend Certified Engineer Exam |
2005 | •• |
| 28479 |
|
Lee H.K. |
Understanding IPv6 |
2005 | •• |
| 28480 |
|
Sands D. |
Understanding Intrusion Detection Through Visualization |
2005 • | •• |
| 28481 |
|
Anderson J.B., Johnnesson R. |
Understanding Information Transmission |
2005 • | •• |
| 28490 |
|
Benyen Ch. |
Understanding Linux Network Internals |
2005 | •• |
| 28498 |
|
Biffl S. (Ed), Boehm B. (Ed), Erdogmus H. (Ed) |
Value-Based Software Engineering |
2005 • | •• |
| 28502 |
|
Mills B. |
Theoretical Introduction to Programming |
2005 | •• |
| 28505 |
|
Zhou S.K., Chellappa R., Zhao W. |
Unconstrained face recognition |
2005 | •• |