27826 |
|
Tan F.B. |
Advanced Topics in Global Information Management Series (Vol. 1) |
2002 | •• |
27825 |
|
Marshall D., Reynolds W.A., McCrory D. |
Advanced Server Virtualization |
2006 | •• |
27824 |
|
Rammer I., Szpuszta M. |
Advanced .NET Remoting |
2005 • | •• |
27823 |
|
Easttom C. |
Advanced Javascript |
2001 • | •• |
27822 |
|
Retana A., Slice D., White R. |
Advanced IP Network Design (CCIE Professional Development) |
1999 | •• |
27821 |
|
Dobbertin H. (ed.), Rijmen V. (ed.), Sowa A. (ed.) |
Advanced Encryption Standard - AES: 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers |
2005 | •• |
27820 |
|
Vaseghi S.V. |
Advanced Digital Signal Processing and Noise Reduction |
2006 | •• |
27819 |
|
Mishra A.R. |
Advanced Cellular Network Planning and Optimisations |
2007 | •• |
27818 |
|
Droblas A., Greenberg S. |
Adobe Premiere Pro Bible |
2003 | •• |
27817 |
|
Eismann K., Palmer W. |
Adobe Photoshop Restoration & Retouching |
2006 • | •• |
27816 |
|
Padova T. |
Adobe Acrobat 8 PDF Bible |
2007 | •• |
27815 |
|
Roff J.T. |
ADO: ActiveX Data Objects |
2001 | •• |
27814 |
|
Nikolaev N., Iba H. |
Adaptive Learning of Polynomial Networks: Genetic Programming, Backpropagation and Bayesian Methods |
2006 | •• |
27813 |
|
Bush S.F., Kulkarni A.B. |
Active networks and active network management |
2001 | •• |
27812 |
|
Hunter L.E. |
Active Directory Field Guide |
2005 | •• |
27811 |
|
Simpson A., Stockman J.C. |
Access 2007 VBA Programming For Dummies |
2007 | •• |
27810 |
|
Nash T. |
Accelerated C# 2005 |
2006 | •• |
27809 |
|
Kluge W. |
Abstract Computing Machines |
2005 | •• |
27808 |
|
|
Linux als Router und Proxy |
n/a | •• |
27807 |
|
Gilmore W.J. |
A Programmer's Introduction to PHP 4.0 |
2000 | •• |
27806 |
|
Acklen L. |
Absolute Beginner's Guide to WordPerfect® 11 |
2003 | •• |
27805 |
|
Fedorov A. |
A Programmer's Guide to .NET |
2002 | •• |
27804 |
|
Purser S. |
A Practical Guide to Managing Information Security |
2004 | •• |
27803 |
|
Sobell M.G. |
A Practical Guide to Linux® Commands, Editors, and Shell Programming |
2005 | •• |
27802 |
|
Kruglinski D.J. |
Programming Visual C++ |
1998 • | •• |
27801 |
|
Gallardo A. |
3D Lighting: History, Concepts, and Techniques |
2000 | •• |
27800 |
|
MacGillivray C., Head A. |
3D for the Web: Interactive 3D animation using 3ds max, Flash and Director |
2004 | •• |
27799 |
|
Howard M., LeBlanc D., Viega J. |
19 Deadly Sins of Software Security: Programming Flaws and How to Fix Them |
2005 | •• |
27798 |
|
Sweeney S. |
101 Ways to Promote Your Web Site |
2004 • | •• |
27797 |
|
Fulton H., Hurst G., Matsumoto Y. |
The Ruby Way |
2001 | •• |
27796 |
|
Kruchten Ph. |
The Rational Unified Process: An Introduction |
2003 • | •• |
27795 |
|
Shrum L.J. |
Psychology of Entertainment Media: Blurring the Lines between Entertainment and Persuasion |
2003 | •• |
27794 |
|
Stevens W.R. |
TCP/IP Illustrated, Volume 1: The Protocols |
1993 | •• |
27793 |
|
Bowman J.S., Darnovsky M., Emerson S. |
The Practical SQL Handbook: Using SQL Variants |
2001 • | •• |
27792 |
|
Kelby S. |
The Photoshop Book for Digital Photographers |
2003 | •• |
27791 |
|
Ambler S.W. |
The Object Primer: Agile Modeling-Driven Development with UML 2 |
2004 • | •• |
27790 |
|
Feitelberg S. |
Net Worth Workout: A Powerful Program for a Lifetime of Financial Fitness |
2005 | •• |
27789 |
|
Gordon A. |
.Net and COM Interoperability Handbook |
2002 | •• |
27788 |
|
Mundy J., Thornthwaite W. |
Microsoft Data Warehouse Toolkit: With SQL Server 2005 and the Microsoft Business Intelligence Toolset |
2006 • | •• |
27787 |
|
Waldo J., Arnold K. |
The Jini Specifications |
2000 • | •• |
27786 |
|
Bodoff S., Pawlan M., Stearns B. |
The J2EE Tutorial |
2002 • | •• |
27785 |
|
Wright G.R., Stevens W.R. |
TCP/IP Illustrated: The Implementation, Vol. 2 |
1995 • | •• |
27784 |
|
Romm J. |
The Hype about Hydrogen: Fact and Fiction in the Race to Save the Climate |
2005 | •• |
27783 |
|
Raskin J. |
The Humane Interface: New Directions for Designing Interactive Systems (ACM Press Series) |
2000 | •• |
27782 |
|
Toigo J.W. |
The Holy Grail of Network Storage Management |
2003 | •• |
27781 |
|
Li M., Baker M. |
Grid: Core Technologies |
2005 • | •• |
27780 |
|
Tiller J.S. |
The Ethical Hack: A Framework for Business Value Penetration Testing |
2004 | •• |
27779 |
|
Ambler S.W. |
The Elements of UML Style |
2003 | •• |
27778 |
|
Lucas J., Moeller B. |
The Effective Incident Response Team |
2003 | •• |
27777 |
|
Litchfield D., Grindlay B., Anley Ch. |
Database Hacker's Handbook: Defending Database Servers |
2005 | •• |