28795 |
|
Dick S., Kandel A. (Ed) |
Computational Intelligence in Software Quality Assurance |
2005 | •• |
28794 |
|
Camarinha-Matos L.M. (Ed), Afsarmanesh H. (Ed), Ortiz A. (Ed) |
Collaborative Networks and Their Breeding Environments |
2005 • | •• |
28793 |
|
Palade V., Jain L.C., Bocaniala C.D. |
Computational Intelligence in Fault Diagnosis |
2006 | •• |
28792 |
|
Walsh B. |
Clear Blogging: How People Blogging Are Changing the World and How You Can Join Them |
2007 | •• |
28791 |
|
Rabuck F., Sweeney P.J. |
CompTIA RFID+ Study Guide (Exam RF0-101, includes CD-ROM) |
2006 | •• |
28790 |
|
LoCascio T. |
Combining Images with Photoshop Elements: Selecting, Layering, Masking, and Compositing |
2006 | •• |
28789 |
|
Gardner M. |
Codes, Ciphers, and Secret Writing |
1984 | •• |
28788 |
|
Lullmann M. |
Color Atlas of Pharmacology |
2005 • | •• |
28787 |
|
Lu R. (Ed), Ullrich C. (Ed), Siekmann J.H. (Ed) |
Cognitive Systems: Joint Chinese-German Workshop, Shanghai, China, March 7-11, 2005: Revised Selected Papers |
2007 | •• |
28786 |
|
Biglieri E. |
Coding For Wireless Channels (Information Technology Series: Transmission, Processing, and Storage) |
2005 • | •• |
28785 |
|
Armada M. (Ed), de Santos P.G. (Ed) |
Climbing and Walking Robots: Proceedings of the 7th International Conference Clawar 2004 |
2005 • | •• |
28784 |
|
Lessig L. |
Code: Version 2.0 |
2006 • | •• |
28783 |
|
Stringfield N., White R., McKee S. |
Cisco Express Forwarding |
2007 | •• |
28782 |
|
Orthwein W.C. |
Clutches and Brakes: Design and Selection, Vol. 168 |
2004 • | •• |
28781 |
|
Richter J. |
CLR Via C#: Applied Microsoft .Net Framework 2.0 Programming |
2006 • | •• |
28780 |
|
Mason A.G., Newcomb M.J. |
Cisco Secure Internet Security Solutions |
2001 | •• |
28779 |
|
Velte T.J. |
Cisco: A Beginner's Guide |
2006 • | •• |
28778 |
|
Miller L.H., Gregory P.H. |
CISSP For Dummies |
2007 • | •• |
28777 |
|
Frahim J., White D., Santos O. |
Cisco Network Admission Control, Volume II: Deployment and Troubleshooting |
2006 | •• |
28776 |
|
Harris J. |
Cisco Network Security Little Black Book |
2002 | •• |
28775 |
|
Hellegouarch S. |
Cherrypy Essentials: Design, Develop, Test, and Deploy Robust, Simple Python Web Applications with Ease |
2007 | •• |
28774 |
|
Roberts S. |
Character Animation in 3D (Focal Press Visual Effects and Animation Series) |
2004 • | •• |
28773 |
|
Graves K. |
CEH: Official Certified Ethical Hacker Review Guide |
2007 | •• |
28772 |
|
Padjen R., Lammle T., Odom S. |
CCNP: Remote Access Study Guide |
2000 | •• |
28771 |
|
Empson S. |
CCNP BSCI Portable Command Guide |
2007 | •• |
28770 |
|
Wood R.L. |
C Programming for Scientists and Engineers (Manufacturing Engineering for Scientists and Engineers) |
2002 | •• |
28769 |
|
Hogenson G., Lippman S. (Ed.) |
C++/CLI: The Visual C++ Language for .NET |
2006 | •• |
28768 |
|
Gittleman A. |
C#. Net Illuminated |
2004 • | •• |
28767 |
|
Juric M.B. |
Business Process Execution Language for Web Services |
2006 • | •• |
28766 |
|
Butterworth-Heinemann |
Business Continuity and Disaster Recovery Planning for IT Professionals |
2007 | •• |
28765 |
|
Graf H. |
Building Websites with Joomla! 1.5 Beta 1 |
2007 | •• |
28764 |
|
Josephsen D. |
Building a Monitoring Infrastructure with Nagios |
2007 | •• |
28763 |
|
Hellberg Ch., Boyes T., Greene D. |
Broadband Network Architectures: Designing and Deploying Triple Play Services |
2007 | •• |
28762 |
|
Adams E. |
Break into the Game Industry: How to Get a Job Making Video Games (Career Series) |
2003 • | •• |
28761 |
|
Chappell J. |
Blues Guitar For Dummies |
2006 | •• |
28760 |
|
Raviele A. (Ed) |
Cardiac Arrhythmias 2005 |
2005 • | •• |
28759 |
|
Goldworm B., Radu P., Skamarock A. |
Blade Servers and Virtualization: Transforming Enterprise Computing While Cutting Costs |
2007 | •• |
28758 |
|
Hoffman D. |
Blackjacking: Security Threats to Blackberry, PDA's, and Cell Phones in the Enterprise |
2007 | •• |
28757 |
|
Barbaro G. (Ed), Boccara F. (Ed) |
Cardiovascular Disease in Aids |
2005 | •• |
28756 |
|
Peacock M. |
Building Websites with Typo3: A Practical Guide to Getting Your Typo3 Website up and Running Fast |
2007 | •• |
28755 |
|
Wong A. |
Breaking Through the BIOS Barrier: The Definitive BIOS Optimization Guide for PCx |
2004 | •• |
28754 |
|
Lenz P. |
Build Your Own Ruby on Rails Web Applications |
2007 | •• |
28752 |
|
Keith J. |
Bulletproof Ajax (Voices that Matter Series) |
2007 | •• |
28751 |
|
Bar-Cohen Y. |
Biomimetics: Biologically Inspired Technologies |
2005 | •• |
28750 |
|
Saeed K. (ed.), Pejas J. (ed.), Mosdorf R. (ed.) |
Biometrics, Computer Security Systems and Artificial Intelligence Applications |
2006 | •• |
28749 |
|
Vielhauer C. |
Biometric User Authentication for IT Security: From Fundamentals to Handwriting |
2005 | •• |
28748 |
|
Wayman J. (ed.), Jain A. (ed.), Maltoni D. (ed.) |
Biometric Systems |
2004 | •• |
28747 |
|
Chen Y.-P.P. |
Bioinformatics Technologies |
2005 | •• |
28745 |
|
Hochreiter S.(ed.), Wagner R.(ed.) |
Bioinformatics Research and Development: First International Conference, BIRD 2007, Berlin, Germany, March 12-14, 2007, Proceedings |
2007 | •• |
28744 |
|
Moorhouse M., Barry P. |
Bioinformatics, biocomputing and Perl |
2004 | •• |