29403 |
|
Brameier M., Banzhaf W. |
Linear Genetic Programming |
2006 | •• |
29402 |
|
van Engers T.M. |
Legal Knowledge and Information Systems: JURIX 2006 - the Nineteenth Annual Conference |
2006 | •• |
29401 |
|
Gottschalk P. |
Knowledge Management Systems: Value Shop Creation |
2006 | •• |
29400 |
|
Cloete I. (ed.), Zurada J.M. (ed.) |
Knowledge-Based Neurocomputing |
2000 | •• |
29399 |
|
Biundo S. (ed.), Fruhwirth T. (ed.), Palm G. (ed.) |
KI 2004: Advances in Artificial Intelligence: 27th Annual German Conference in AI, KI 2004, Ulm, Germany, September 20-24, 2004, Proceedings |
2004 | •• |
29398 |
|
Haines S., Potts S. |
Java 2 Primer Plus |
2002 | •• |
29397 |
|
Woods D., Hollnagel E. |
Joint Cognitive Systems: Patterns in Cognitive Systems Engineering |
2006 | •• |
29396 |
|
Zlolniski C. |
Janitors, Street Vendors, and Activists - the Lives of Mexican Immigrants in Silicon Valley |
2006 | •• |
29395 |
|
Dudney B., Osborne D., Asbury S. |
J2EE Antipatterns |
2003 | •• |
29394 |
|
Butler C., Fuller E., Rogers J.A. |
Security Interviews Exposed: Secrets to Landing Your Next Information Security Job |
2007 | •• |
29393 |
|
Stahl B.C.C. |
Issues and Trends in Technology and Human Interaction |
2006 | •• |
29392 |
|
Pogue D. |
iPhone: The Missing Manual |
2007 | •• |
29391 |
|
Vegesna S. |
IP Quality of Service |
2001 | •• |
29390 |
|
Thorn A. |
Introduction to Game Programming with C++ |
2007 | •• |
29389 |
|
Comer D.E.E., Stevens D.L. |
Internetworking with TCP/IP Vol. III, Client-Server Programming and Applications--BSD Socket Version |
1996 • | •• |
29388 |
|
Janczewski L. |
Internet and Intranet Security Management: Risks and Solutions |
2000 | •• |
29387 |
|
Jensen J.F. |
Interactive TV: A Shared Experience: 5th European Conference, Euroitv 2007, Amsterdam, the Netherlands, May 24-25, 2007, Proceedings |
2007 | •• |
29386 |
|
Shih T.K. (ed.), Wang P.P. (ed.) |
Intelligent Virtual World: Technologies and Applications in Distributed Virtual Environment |
2004 | •• |
29385 |
|
Klopotek M.A. (ed.), Weirzchon S.T., Trojanowski K. (ed.) |
Intelligent Information Processing and Web Mining: Proceedings of the International Iis: Iipwm´05 Conference Held in Gdansk, Poland, June 13-16 2005 |
2005 | •• |
29384 |
|
Chorafas D.N. |
Integrating Erp, Crm, Supply Chain Management, and Smart Materials |
2001 | •• |
29383 |
|
Gallager R.G. |
Information Theory and Reliable Communication |
1968 | •• |
29382 |
|
Krause M. |
Information Security Management Handbook, Volume 3 |
2006 • | •• |
29381 |
|
Al-Hakim L. |
Information Quality Management: Theory and Applications |
2006 | •• |
29380 |
|
Jaakkola H. (ed.), Kiyoki Y. (ed.) |
Information Modelling and Knowledge Bases XV, Vol. 105 |
2004 | •• |
29379 |
|
Raisanen V. |
Implementing Service Quality in IP Networks |
2003 | •• |
29378 |
|
Camacho R. (ed.), King R. (ed.), Srinivasan A. (ed.) |
Inductive Logic Programming: 14th International Conference, ILP 2004, Porto, Portugal, September 6-8, 2004, Proceedings |
2004 | •• |
29377 |
|
Ben-Natan R. |
Implementing Database Security and Auditing |
2005 | •• |
29376 |
|
Natsuno T. |
I-Mode Strategy |
2003 | •• |
29375 |
|
Thomas S.A. |
HTTP Essentials |
2001 | •• |
29374 |
|
Smith B., Keegan L., Guzzetta C.E. |
Holistic Nursing: A Handbook for Practice |
2004 • | •• |
29373 |
|
Loosley C., Douglas F. |
High-Performance Client-Server |
1997 | •• |
29372 |
|
National Research Council |
Government Data Centers: Meeting Increasing Demands |
2003 | •• |
29371 |
|
Charnes J. |
Financial Modeling with Crystal Ball and Excel |
2007 | •• |
29370 |
|
Last M. (ed.), Kandel A. (ed.) |
Fighting Terror in Cyberspace |
2005 | •• |
29369 |
|
Boccara N. |
Essentials of Mathematica: With Applications to Mathematics and Physics |
2007 | •• |
29368 |
|
Csiszar I. |
Entropy, Search, Complexity |
2007 | •• |
29367 |
|
Bandyopadhyay S., Roy S., Ueda T. |
Enhancing the Performance of Ad Hoc Wireless Networks with Smart Antennas |
2006 | •• |
29366 |
|
Kacsuk P. (ed.), Fahringer T. (ed.), Nemeth Z. (ed.) |
Distributed and Parallel Systems: From Cluster to Grid Computing |
2007 | •• |
29365 |
|
Brooks R.R., Gallo F.P. |
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks |
2004 | •• |
29364 |
|
Henkel J. (ed.), Parameswaran S. (ed.) |
Designing Embedded Processors: A Low Power Perspective |
2007 | •• |
29363 |
|
Drozdek A. |
Data Structures and Algorithms in C++ |
2000 | •• |
29362 |
|
Gardner H., Manduchi G. |
Design Patterns for E-Science |
2007 | •• |
29361 |
|
Ponniah P. |
Data Modeling Fundamentals |
2007 | •• |
29360 |
|
Matignon R. |
Data Mining Using SAS Enterprise Miner |
2007 | •• |
29359 |
|
Conejo R. (ed.), Urretavizcaya M. (ed.) |
Current Topics in Artificial Intelligence |
2004 | •• |
29358 |
|
Hyslop M. |
Critical Information Infrastructures: Resilience and Protection |
2007 | •• |
29357 |
|
Lerner K.L. (ed.), Lerner B.W. (ed.) |
Crime and Punishment: Essential Primary Sources |
2006 | •• |
29356 |
|
McCrary S.A. |
Hedge Fund Course (Wiley Finance Series) |
2005 | •• |
29355 |
|
Basham B., Sierra K., Bates B. |
Head First Servlets & JSP: Passing the Sun Certified Web Component Developer Exam |
2004 • | •• |
29354 |
|
Thalmann D. |
Handbook of Virtual Humans |
2004 | •• |