27421 |
|
Burgess R.A. |
Mmurtl V1.0 |
2000 | •• |
27420 |
|
Loudon K. |
Mastering Algorithms with C |
1999 | •• |
27419 |
|
Skoudis E., Zelster L. |
Malware: Fighting Malicious Code |
2003 | •• |
27418 |
|
|
Structural inference in cointegrated vector autoregressive models |
n/a | •• |
27417 |
|
Jendrock E., Ball J., Carson D. |
The Java™ EE 5 Tutorial |
2006 • | •• |
27416 |
|
Culwin F. |
A Java GUI programmer's primer |
1998 | •• |
27415 |
|
Otey M., Otey D. |
Microsoft(r) SQL Server(tm) 2005 Developer's Guide |
2005 | •• |
27414 |
|
The O'Reilly Java Authors |
Java™ Enterprise Best Practices |
2002 | •• |
27413 |
|
Boyce J. |
Microsoft Office Outlook 2003 inside out |
2003 | •• |
27412 |
|
Andersen V. |
Microsoft Office Access 2003: The Complete Reference |
2003 | •• |
27411 |
|
Venners B. |
Inside the Java virtual machine |
1997 | •• |
27410 |
|
Gallagher T., Jeffries B., Landauer L. |
Hunting Security Bugs |
2006 | •• |
27409 |
|
Oppleman V., Friedrichs O., Watson B. |
Extreme Exploits: Advanced Defenses Against Hardcore Hacks |
2005 | •• |
27408 |
|
Box D., Sells C. |
Essential .NET, Volume 1: The Common Language Runtime |
2002 | •• |
27407 |
|
Anderson G., Anderson P. |
Enterprise JavaBeans™ Component Architecture: Designing and Coding Enterprise Applications |
2002 | •• |
27406 |
|
Rumsey F., Watkinson J. |
Digital Interface Handbook |
2004 • | •• |
27405 |
|
Edwards L., Barker R. |
Developing Series 60 Applications: A Guide for Symbian OS C++ Developers |
2004 | •• |
27404 |
|
Troelsen A.W. |
Developer's Workshop to COM and ATL 3.0 |
2000 | •• |
27403 |
|
Sunblad S., Sunblad P. |
Designing for scalability with Microsoft Windows DNA |
2000 | •• |
27402 |
|
Oliver R.I. |
Designing Enterprise Applications with Microsoft Visual Basic .NET |
2002 | •• |
27401 |
|
Augustine S. |
Managing Agile Projects |
2005 | •• |
27400 |
|
Kirtland M. |
Designing Component-Based Applications |
1998 | •• |
27399 |
|
Nikolaisen N. |
Making WIN32 Applications Mobile |
2002 | •• |
27398 |
|
Tiemann B. |
MAC OS X Tiger in a Snap |
2001 | •• |
27397 |
|
Zobkiw J. |
Mac OS X: Advanced Development Techniques |
2003 | •• |
27396 |
|
Louis P.J. |
M-Commerce Crash Course |
2001 • | •• |
27395 |
|
Benz B., Oliver R. |
Lotus Notes and Domino 6 Programming Bible |
2003 • | •• |
27394 |
|
Smith P.G. |
Linux Network Security (Administrator's Advantage Series) |
2005 | •• |
27393 |
|
Wehrle K., Pahlke F., Ritter H. |
Linux Network Architecture |
2004 • | •• |
27392 |
|
Johnson M.K., Troan E.W. |
Linux Application Development |
2004 • | •• |
27391 |
|
Fitzgerald M. |
Learning XSLT |
2003 | •• |
27390 |
|
Liberty J. |
Learning Visual Basic .NET |
2002 • | •• |
27389 |
|
Taylor D., Jepson B. |
Learning Unix for Mac OS X Panther |
2003 • | •• |
27388 |
|
Thomas T.M., Pavlichek D.E., Dwyer L.H. |
Juniper Networks Reference Guide: JUNOS Routing, Configuration, and Architecture |
2002 | •• |
27387 |
|
Garrett A., Drenan G., Morris C. |
Juniper Networks Field Guide and Reference |
2002 | •• |
27386 |
|
Heaton J. |
JSTL: JSP Standard Tag Library Kick Start |
2002 • | •• |
27385 |
|
Van Haecke B. |
JDBC 3.0: JAVA Database Connectivity |
2002 • | •• |
27384 |
|
Flanagan D. |
JavaScript: The Definitive Guide |
2006 • | •• |
27383 |
|
Loy M., Elliott J., Wood D. |
Java Swing |
2002 • | •• |
27382 |
|
Lewis N.D. |
Easy Microsoft Office 2003 |
2003 | •• |
27381 |
|
Hunter J. |
Java servlet programming |
2001 • | •• |
27380 |
|
Flenner R., Abbott M., Boubez T. |
Java™ P2P Unleashed |
2002 | •• |
27379 |
|
Hollabaugh G. |
Embedded Linux®: Hardware, Software, and Interfacing |
2002 | •• |
27378 |
|
Oppliger R. |
Internet and Intranet Security |
2002 • | •• |
27377 |
|
Keogh J. |
J2ME, the complete reference |
2003 | •• |
27376 |
|
Evans J.S., Trimper G.L. |
Itanium® Architecture for Programmers: Understanding 64-Bit Processors and EPIC Principles |
2003 | •• |
27375 |
|
Walker G. |
IT problem management |
2001 | •• |
27374 |
|
Hagen S. |
IPv6 essentials |
2002 | •• |
27373 |
|
Kipper G. |
Investigator's Guide to Steganography |
2004 | •• |
27372 |
|
Trucco E., Verri A. |
Introductory techniques for 3-D computer vision |
1998 | •• |