Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
Ìåõìàòÿíàì
square Ïåðâûé êóðñ

square Âòîðîé êóðñ

square Òðåòèé êóðñ

square ×åòâåðòûé êóðñ

square Ïÿòûé êóðñ
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
Êðàñîòà
blank
blank
Áûñòðûé ïåðåõîä
Ïî íàçâàíèþ:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z À Á Â Ã Ä Å ¨ Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
Ïî àâòîðó:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ¨ À Á Â Ã Ä Å Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
blank
Âñå ðåñóðñû
Ñîðòèðîâêà:

ID asc desc pic Àâòîðû asc desc Íàçâàíèå asc desc Ãîä asc desc Äîï.
27420 Loudon K. Mastering Algorithms with C 1999
27419 Skoudis E., Zelster L. Malware: Fighting Malicious Code 2003
27418 Structural inference in cointegrated vector autoregressive models n/a
27417 Jendrock E., Ball J., Carson D. The Java™ EE 5 Tutorial 2006
27416 Culwin F. A Java GUI programmer's primer 1998
27415 Otey M., Otey D. Microsoft(r) SQL Server(tm) 2005 Developer's Guide 2005
27414 The O'Reilly Java Authors Java™ Enterprise Best Practices 2002
27413 Boyce J. Microsoft Office Outlook 2003 inside out 2003
27412 Andersen V. Microsoft Office Access 2003: The Complete Reference 2003
27411 Venners B. Inside the Java virtual machine 1997
27410 Gallagher T., Jeffries B., Landauer L. Hunting Security Bugs 2006
27409 Oppleman V., Friedrichs O., Watson B. Extreme Exploits: Advanced Defenses Against Hardcore Hacks 2005
27408 Box D., Sells C. Essential .NET, Volume 1: The Common Language Runtime 2002
27407 Anderson G., Anderson P. Enterprise JavaBeans™ Component Architecture: Designing and Coding Enterprise Applications 2002
27406 Rumsey F., Watkinson J. Digital Interface Handbook 2004
27405 Edwards L., Barker R. Developing Series 60 Applications: A Guide for Symbian OS C++ Developers 2004
27404 Troelsen A.W. Developer's Workshop to COM and ATL 3.0 2000
27403 Sunblad S., Sunblad P. Designing for scalability with Microsoft Windows DNA 2000
27402 Oliver R.I. Designing Enterprise Applications with Microsoft Visual Basic .NET 2002
27401 Augustine S. Managing Agile Projects 2005
27400 Kirtland M. Designing Component-Based Applications 1998
27399 Nikolaisen N. Making WIN32 Applications Mobile 2002
27398 Tiemann B. MAC OS X Tiger in a Snap 2001
27397 Zobkiw J. Mac OS X: Advanced Development Techniques 2003
27396 Louis P.J. M-Commerce Crash Course 2001
27395 Benz B., Oliver R. Lotus Notes and Domino 6 Programming Bible 2003
27394 Smith P.G. Linux Network Security (Administrator's Advantage Series) 2005
27393 Wehrle K., Pahlke F., Ritter H. Linux Network Architecture 2004
27392 Johnson M.K., Troan E.W. Linux Application Development 2004
27391 Fitzgerald M. Learning XSLT 2003
27390 Liberty J. Learning Visual Basic .NET 2002
27389 Taylor D., Jepson B. Learning Unix for Mac OS X Panther 2003
27388 Thomas T.M., Pavlichek D.E., Dwyer L.H. Juniper Networks Reference Guide: JUNOS Routing, Configuration, and Architecture 2002
27387 Garrett A., Drenan G., Morris C. Juniper Networks Field Guide and Reference 2002
27386 Heaton J. JSTL: JSP Standard Tag Library Kick Start 2002
27385 Van Haecke B. JDBC 3.0: JAVA Database Connectivity 2002
27384 Flanagan D. JavaScript: The Definitive Guide 2006
27383 Loy M., Elliott J., Wood D. Java Swing 2002
27382 Lewis N.D. Easy Microsoft Office 2003 2003
27381 Hunter J. Java servlet programming 2001
27380 Flenner R., Abbott M., Boubez T. Java™ P2P Unleashed 2002
27379 Hollabaugh G. Embedded Linux®: Hardware, Software, and Interfacing 2002
27378 Oppliger R. Internet and Intranet Security 2002
27377 Keogh J. J2ME, the complete reference 2003
27376 Evans J.S., Trimper G.L. Itanium® Architecture for Programmers: Understanding 64-Bit Processors and EPIC Principles 2003
27375 Walker G. IT problem management 2001
27374 Hagen S. IPv6 essentials 2002
27373 Kipper G. Investigator's Guide to Steganography 2004
27372 Trucco E., Verri A. Introductory techniques for 3-D computer vision 1998
27371 Stallings W. Cryptography and Network Security Principles and Practices 2005


blank
HR
@Mail.ru
© Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2024
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01!| Valid CSS! Î ïðîåêòå