28481 |
|
Anderson J.B., Johnnesson R. |
Understanding Information Transmission |
2005 • | •• |
28480 |
|
Sands D. |
Understanding Intrusion Detection Through Visualization |
2005 • | •• |
28479 |
|
Lee H.K. |
Understanding IPv6 |
2005 | •• |
28478 |
|
Coggeshall J., Tabini M. |
The Zend PHP Certification Practice Test Book: Practice Questions for the Zend Certified Engineer Exam |
2005 | •• |
28477 |
|
Ambler S.W., Constantine L. |
The Unified Process Transition and Production Phases |
2001 • | •• |
28476 |
|
Pereira F., Burnett I., Koenen R. (Ed) |
The MPEG-21 Book |
2006 | •• |
28475 |
|
Pender T.A. |
UML Bible |
2003 • | •• |
28474 |
|
Moore A.C., Penman J., Hower Ch. |
Tomes Of Delphi: Basic 32-BIT |
2001 | •• |
28473 |
|
Horst B. |
The Tiny Guide to OpenOffice.org |
2005 | •• |
28472 |
|
Walter J., Roberts S., Snaith P. |
The C++ How-To |
1998 | •• |
28471 |
|
Takahashi D. |
The Xbox 360 Uncloaked: The Real Story Behind Microsoft's Next-Generation Video Game Console |
2006 | •• |
28470 |
|
Dempster B., Garrison K. |
Trixbox Made Easy: A Step-by-Step Guide to Installing and Running Your Home and Office Voip System |
2006 | •• |
28469 |
|
Sripimanwat K. (Ed) |
Turbo Code Applications: A Journey from a Paper to Realization |
2005 • | •• |
28468 |
|
Shim J.K., Qureshi A.A., Siegel J.G. |
The international handbook of computer security |
2000 | •• |
28467 |
|
Raynor W.J. |
The international dictionary of artificial intelligence |
2000 | •• |
28466 |
|
Bellavista P., Corradi A. |
The Handbook of Mobile Middleware |
2006 | •• |
28465 |
|
Habgood J., Overmars M. |
The Game Maker's Apprentice |
2006 | •• |
28464 |
|
Hentzen W. |
The fundamentals, building visual studio applications on a Visual FoxPro foundation |
1999 | •• |
28463 |
|
Borrie H. |
The Firebird Book: A Reference for Database Developers |
2004 • | •• |
28462 |
|
McKusick M.K., Bostic K., Karels M.J. |
The design and implementation of the 4. 4BSD operating system |
1996 | •• |
28461 |
|
Huff B. |
The Definitive Guide to Stellent Content Server Development |
2006 | •• |
28460 |
|
Zukowski J. |
The Definitive Guide to Java Swing |
2005 • | •• |
28459 |
|
DiMarzio J.F. |
The Debugger's Handbook |
2006 | •• |
28458 |
|
Krafft M. |
The Debian System |
2005 | •• |
28457 |
|
Andrew R. |
The CSS Anthology |
2004 | •• |
28456 |
|
Oklobdzija V. |
The computer engineering handbook |
2001 | •• |
28455 |
|
Duncan C. |
The Career Programmer |
2002 | •• |
28454 |
|
Dunaway R.B. |
The Book of Visual Studio .NET |
2002 | •• |
28453 |
|
Charalabidis A. |
The Book of IRC |
1999 | •• |
28452 |
|
Croucher P. |
The BIOS Companion |
2004 | •• |
28451 |
|
Spolsky J. |
The Best Software Writing I |
2005 | •• |
28450 |
|
McGuire T.M., Gouda M.G. |
The Austin protocol compiler |
2004 | •• |
28449 |
|
McCall M. |
The AS/400 Programmer's Handbook: A Toolbox of Examples for Every AS/400 Programmer |
1998 | •• |
28448 |
|
Kirk D. (ed.) |
Graphics Gems III |
1995 | •• |
28447 |
|
Beydeda S., Gruhn V. |
Testing Commercial-off-the-Shelf Components and Systems |
2005 | •• |
28446 |
|
Corne D.W. (ed.), Oates M.J. (ed.), Smith G.D. (ed.) |
Telecommunications optimization |
2000 | •• |
28445 |
|
Keller E. |
Technology paradise lost |
2004 | •• |
28444 |
|
Morrison M. |
Teach Yourself Internet Game Programming With Java in 21 Days |
1996 | •• |
28443 |
|
Bentham J. |
TCP/IP Lean: Web Servers for Embedded Systems |
2002 • | •• |
28442 |
|
Flynt C. |
Tcl/Tk : A Developer's Guide |
2003 • | •• |
28441 |
|
Ship H.M.L. |
Tapestry in Action |
2004 | •• |
28440 |
|
Holub A. |
Taming Java Threads |
2000 | •• |
28439 |
|
Craig R.D., Jaskiel S.P. |
Systematic Software Testing |
2002 | •• |
28438 |
|
Rajsuman R. |
System-on-a-Chip: Design and Test |
2000 | •• |
28437 |
|
Gregg M. |
Syngress Force Emerging Threat Analysis |
2006 | •• |
28436 |
|
Scarpino M., Holder S., Ng S. |
SWT/JFace in Action : GUI Design with Eclipse 3.0 |
2004 | •• |
28435 |
|
Nedjah N., Mourelle L.M. |
Swarm Intelligent Systems |
2006 | •• |
28434 |
|
Valenti S. (ed.) |
Successful Software Reengineering |
2002 | •• |
28433 |
|
Chaudhry N., Shaw K., Abdelguerfi M. |
Stream data management |
2005 | •• |
28432 |
|
Mullen T., Russel R., Eller R. |
Stealing the Network : How to Own an Identity |
2005 | •• |