3948 |
|
Kouti S., Seitsonen M. |
Inside Active Directory |
2004 • | •• |
3947 |
|
Ýéíøòåéí À. |
Òåîðèÿ îòíîñèòåëüíîñòè |
2000 | •• |
3946 |
|
Ñàâåëüåâ Ë.ß. |
Ýëåìåíòàðíàÿ òåîðèÿ âåðîÿòíîñòåé. ×àñòü 2 |
2005 | •• |
3945 |
|
Ñàâåëüåâ Ë.ß. |
Ýëåìåíòàðíàÿ òåîðèÿ âåðîÿòíîñòåé (÷àñòü 1) |
2005 | •• |
3944 |
|
Âèëåíêèí Í.ß. |
Ðàññêàçû î ìíîæåñòâàõ |
1965 | •• |
3943 |
|
Zero G Team |
InstallAnywhere Tutorial and Reference Guide |
2004 | •• |
3942 |
|
Kecman V. |
Learning and soft computing. Support vector machines, neural networks, and fuzzy logic models |
2001 | •• |
3941 |
|
Ãðèí Ä., Êíóò Ä. |
Ìàòåìàòè÷åñêèå ìåòîäû àíàëèçà àëãîðèòìîâ |
1987 | •• |
3940 |
|
Ôàóëåð Ì., Ñêîòò Ê. |
UML îñíîâû. Êðàòêîå ðóêîâîäñòâî ïî óíèôèöèðîâàííîìó ÿçûêó ìîäåëèðîâàíèÿ |
2002 • | •• |
3939 |
|
Îëèôåð Â.Ã., Îëèôåð Í.À. |
Êîìïüþòåðíûå ñåòè. Ïðèíöèïû, òåõíîëîãèè, ïðîòîêîëû |
2001 | •• |
3938 |
|
Hu Y.H. (ed.), Hwang J.-N. (ed.) |
Handbook of neural network signal processing |
2002 | •• |
3937 |
|
Barr A. |
Find the Bug A Book of Incorrect Programs |
2004 | •• |
3936 |
|
Bodoff S., Armstrong E., Ball J. |
The J2EE Tutorial Second Edition |
2004 • | •• |
3935 |
|
Megginson D. |
Imperfect XML: rants, raves, tips, and tricks... from an insider |
2004 | •• |
3934 |
|
Riordan R.M. |
Seeing Data: Designing User Interfaces for Database Systems Using .NET |
2004 | •• |
3933 |
|
Neward T. |
Effective enterprise Java |
2004 | •• |
3932 |
|
Singh I., Brydon S., Murray G. |
Designing Web services with the J2EE™ 1.4 platform JAX-RPC, SOAP, and XML technologies |
2004 | •• |
3931 |
|
Homer A., Sussman D., Howard R. |
ASP.NET v.2.0—the beta version |
2004 | •• |
3930 |
|
Ross R.G. |
Principles of the business rule approach |
2003 | •• |
3929 |
|
Yuen P.K., Lau V. |
Practical Web technologies |
2003 | •• |
3928 |
|
Arthorne J., Laffra C. |
Official Eclipse 3.0 Faqs |
2004 | •• |
3927 |
|
Putz J. |
Maximizing ASP.NET |
2005 | •• |
3926 |
|
Alberts C., Dorofee A. |
Managing information security risks: the OCTAVE approach |
2002 | •• |
3925 |
|
Bishop M. |
Introduction to computer security |
2004 | •• |
3924 |
|
Edwards B.M., Giuliano L.A., Wright B.R. |
Interdomain multicast routing: practical Juniper networks and Cisco systems solutions |
2002 | •• |
3923 |
|
Schaffer E. |
Institutionalization of usability: a step-by-step guide |
2004 | •• |
3922 |
|
Wilson M. |
Imperfect C++ practical solutions for real-life programming |
2004 | •• |
3921 |
|
Blackburn P., Vaughn W.R. |
Hitchhiker's guide to SQL Server 2000 reporting services |
2004 | •• |
3920 |
|
Iverson W. |
Hibernate: a J2EE™ developer's guide |
2004 | •• |
3919 |
|
Beck K., Andres C. |
Extreme programming explained: embrace change |
2004 • | •• |
3918 |
|
Bulka D., Mayhew D. |
Efficient C++ performance programming techniques |
1999 | •• |
3917 |
|
Wagner B. |
Effective C#: 50 specific ways to improve your C# |
2004 | •• |
3916 |
|
Budinsky F., Steinberg D., Merks E. |
Eclipse modeling framework: a developer's guide |
2003 | •• |
3915 |
|
Carlson D. |
Eclipse distilled |
2005 | •• |
3914 |
|
Colyer A., Clement A., Harley G |
Eclipse AspectJ: aspect-oriented programming with AspectJ and the eclipse AspectJ development tools |
2004 | •• |
3913 |
|
Yuan M.J., Sharp K. |
Developing scalable series 40 applications: a guide for Java developers |
2004 | •• |
3912 |
|
Riordan R.M. |
Designing effective database systems |
2005 | •• |
3911 |
|
Shalloway A., Trott J.R. |
Design patterns explained a new perspective on object-oriented design |
2004 • | •• |
3910 |
|
Gupta A., Laliberte S. |
Defend I.T.: security by example |
2004 | •• |
3909 |
|
Nock C. |
Data access patterns: database interactions in object-oriented applications |
2003 | •• |
3908 |
|
Cockburn A. |
Crystal clear a human-powered methodology for small teams |
2004 | •• |
3907 |
|
Dewhurst S.C. |
C++ gotchas: avoiding common problems in coding and design |
2002 | •• |
3906 |
|
Gamma E., Beck K. |
Contributing to eclipse: principles, patterns, and plug-ins |
2003 | •• |
3905 |
|
Ahern D.M., Armstrong J., Clouse A. |
CMMI® SCAMPI Distilled |
2005 | •• |
3904 |
|
Fox D., Box J. |
Building solutions with the Microsoft .NET compact framework: architecture and best practices for mobile development |
2003 | •• |
3903 |
|
Shapiro J.R., Policht M. |
Building high availability Windows Server™ 2003 solutions |
2004 | •• |
3902 |
|
Pattison T., Hummel J. |
Building applications and components with Visual Basic .NET |
2003 | •• |
3901 |
|
Jacobson I., Ng P.-W. |
Aspect-oriented software development with use cases |
2004 | •• |
3900 |
|
Gamma E., Helm R., Johnson R. |
Design Patterns CD. Elements of reusable object-oriented software |
1994 | •• |
3899 |
|
Ãàììà Ý., Õåëì Ð., Äæîíñîí Ð. |
Ïðèåìû îáúåêòíî-îðèåíòèðîâàííîãî ïðîåêòèðîâàíèÿ. Ïàòòåðíû ïðîåêòèðîâàíèÿ |
2001 | •• |