| 28717 |
|
Minasi M., Hynes B. |
Administering Windows Vista Security: The Big Surprises |
2007 | •• |
| 28719 |
|
Adobe Creative Team |
Adobe® Flash® CS3 Professional Classroom in a Book® |
2007 | •• |
| 28722 |
|
Decker R. (ed.), Lenz H.-J. (ed.) |
Advances in Data Analysis |
2007 | •• |
| 28724 |
|
Zhang D. (ed.), Ysai J.J.P. (ed.) |
Advances in Machine Learning Applications in Software Engineering |
2007 | •• |
| 28730 |
|
Churcher C. |
Beginning Database Design |
2007 | •• |
| 28733 |
|
Asnash L., Meggido E., Thomas C. |
Beginning Excel Services |
2007 | •• |
| 28734 |
|
Wilton P., McPeak J, |
Beginning JavaScript |
2007 • | •• |
| 28737 |
|
Brosnan J., Copeland K. |
Beginning TiVo Programming |
2007 | •• |
| 28738 |
|
Hunter D., Rafter J., Fawcett J. |
Beginning XML |
2007 • | •• |
| 28743 |
|
Kaptelinin V. (ed.), Czerwinski M. (ed.) |
Beyond the Desktop Metaphor |
2007 | •• |
| 28745 |
|
Hochreiter S.(ed.), Wagner R.(ed.) |
Bioinformatics Research and Development: First International Conference, BIRD 2007, Berlin, Germany, March 12-14, 2007, Proceedings |
2007 | •• |
| 28752 |
|
Keith J. |
Bulletproof Ajax (Voices that Matter Series) |
2007 | •• |
| 28754 |
|
Lenz P. |
Build Your Own Ruby on Rails Web Applications |
2007 | •• |
| 28756 |
|
Peacock M. |
Building Websites with Typo3: A Practical Guide to Getting Your Typo3 Website up and Running Fast |
2007 | •• |
| 28758 |
|
Hoffman D. |
Blackjacking: Security Threats to Blackberry, PDA's, and Cell Phones in the Enterprise |
2007 | •• |
| 28759 |
|
Goldworm B., Radu P., Skamarock A. |
Blade Servers and Virtualization: Transforming Enterprise Computing While Cutting Costs |
2007 | •• |
| 28763 |
|
Hellberg Ch., Boyes T., Greene D. |
Broadband Network Architectures: Designing and Deploying Triple Play Services |
2007 | •• |
| 28764 |
|
Josephsen D. |
Building a Monitoring Infrastructure with Nagios |
2007 | •• |
| 28765 |
|
Graf H. |
Building Websites with Joomla! 1.5 Beta 1 |
2007 | •• |
| 28766 |
|
Butterworth-Heinemann |
Business Continuity and Disaster Recovery Planning for IT Professionals |
2007 | •• |
| 28771 |
|
Empson S. |
CCNP BSCI Portable Command Guide |
2007 | •• |
| 28773 |
|
Graves K. |
CEH: Official Certified Ethical Hacker Review Guide |
2007 | •• |
| 28775 |
|
Hellegouarch S. |
Cherrypy Essentials: Design, Develop, Test, and Deploy Robust, Simple Python Web Applications with Ease |
2007 | •• |
| 28778 |
|
Miller L.H., Gregory P.H. |
CISSP For Dummies |
2007 • | •• |
| 28783 |
|
Stringfield N., White R., McKee S. |
Cisco Express Forwarding |
2007 | •• |
| 28787 |
|
Lu R. (Ed), Ullrich C. (Ed), Siekmann J.H. (Ed) |
Cognitive Systems: Joint Chinese-German Workshop, Shanghai, China, March 7-11, 2005: Revised Selected Papers |
2007 | •• |
| 28792 |
|
Walsh B. |
Clear Blogging: How People Blogging Are Changing the World and How You Can Join Them |
2007 | •• |
| 28806 |
|
Jelen B. |
Charts and Graphs for Microsoft |
2007 | •• |
| 28812 |
|
Padova T., Mason D. |
Color Management for Digital Photographers For Dummies |
2007 | •• |
| 28821 |
|
Ammeraal L., Zhang K. |
Computer Graphics for Java Programmers |
2007 • | •• |
| 28832 |
|
Connolly R. |
Core Internet Application Development with ASP.NET 2.0 |
2007 | •• |
| 28834 |
|
Geary D. |
Core JavaServer™ Faces |
2007 • | •• |
| 28837 |
|
Löffler G., Posch P.N. |
Credit Risk Modeling using Excel and VBA |
2007 | •• |
| 28838 |
|
Fogie S., Grossman J., Hansen R. |
Cross Site Scripting Attacks |
2007 | •• |
| 28840 |
|
Bajaj G. |
Cutting Edge PowerPoint 2007 For Dummies |
2007 | •• |
| 28841 |
|
Reyes A., Brittson R., O'Shea K. |
Cyber Crime Investigations |
2007 | •• |
| 28847 |
|
Markov Z., Larose D.T. |
Data Mining the Web: Uncovering Patterns in Web Content, Structure, and Usage |
2007 | •• |
| 28855 |
|
Umeda M. |
Declarative Programming for Knowledge Management: 16th International Conference on Applications of Declarative Programming and Knowledge Management, Inap 2005 Fukuoka, Japan, October 22-24, 2005: Revised Selected Papers |
2007 | •• |
| 28859 |
|
Vogiazou Y. |
Design for Emergence: Collaborative Social Play with Online and Location-Based Media - Volume 153 Frontiers in Artificial Intelligence and Applications |
2007 | •• |
| 28860 |
|
Kong J. |
Designing BSD Rootkits: An Introduction to Kernel Hacking |
2007 | •• |
| 28863 |
|
Heilesen S.B. (ed.), Jensen S.S. (ed.) |
Designing for Networked Communications: Strategies and Development |
2007 | •• |
| 28864 |
|
Roberts S., Green H. |
Designing Forms for Microsoft Office InfoPath and Forms Services 2007 |
2007 | •• |
| 28867 |
|
Ballard B. |
Designing the Mobile User Experience |
2007 | •• |
| 28869 |
|
Imaz M., Benyon D. |
Designing with Blends: Conceptual Foundations of Human-Computer Interaction and Software Engineering |
2007 | •• |
| 28871 |
|
Karris S.T. |
Digital Circuit Analysis and Design with SIMULINK Modeling: And Introduction to CPLDs and FPGAs |
2007 • | •• |
| 28879 |
|
Kurata D., Lhotka R. |
Doing Objects in Visual Basic 2005 (Addison-Wesley Microsoft Technology Series) |
2007 | •• |
| 28882 |
|
Steventon J. |
DJing for Dummies |
2007 | •• |
| 28883 |
|
Mao Ch., Yokomori T. |
DNA Computing: 12th International Meeting on DNA Computing, Dna12, Seoul, Korea, June 5-9, 2006: Revised Selected Papers |
2007 | •• |
| 28884 |
|
Vidal R. (Ed), Heyden A. (Ed), Ma Y. (Ed) |
Dynamical Vision: Iccv 2005 and ECCV 2006 Workshops, Wdv 2005 and Wdv 2006, Beijing, China, October 21, 2005 [and] Graz, Austria, May 13, 2006: Revised Papers |
2007 | •• |
| 28886 |
|
Lowery J.W. |
Dreamweaver CS3 Bible |
2007 | •• |