27623 |
|
Finkelstein E. |
AutoCAD 2006 and AutoCAD LT 2006 Bible |
2005 • | •• |
27643 |
|
Noel M. |
Microsoft Internet Security and Acceleration (ISA) Server 2004 Unleashed |
2005 | •• |
27655 |
|
Buyens J. |
Microsoft Windows SharePoint Services Inside Out |
2005 | •• |
27670 |
|
Kratzer T., Korte E. |
NOVELL GroupWise 7 Administrator Solutions Guide |
2005 | •• |
27673 |
|
Salleh Sh., Zomaya A.Y., Olariu S. |
Numerical Simulations and Case Studies Using Visual C++. Net |
2005 | •• |
27693 |
|
Homer A., Anderson R., Howard R. |
Professional ASP.NET 1.0, Special Edition |
2005 • | •• |
27701 |
|
Kochan S.G. |
Programming in C: A Complete Introduction to the C Programming Language |
2005 • | •• |
27703 |
|
Esposito D. |
Programming Microsoft ASP.Net 2.0 Core Reference |
2005 | •• |
27707 |
|
Stenholm S., Suominen K.-A. |
Quantum Approach to Informatics |
2005 | •• |
27709 |
|
Barkakati N. |
Red Hat Linux Fedora Secrets |
2005 | •• |
27737 |
|
Zalewski M. |
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks |
2005 • | •• |
27765 |
|
Microsoft Press |
Testing . Net Application Blocks |
2005 | •• |
27777 |
|
Litchfield D., Grindlay B., Anley Ch. |
Database Hacker's Handbook: Defending Database Servers |
2005 | •• |
27781 |
|
Li M., Baker M. |
Grid: Core Technologies |
2005 • | •• |
27784 |
|
Romm J. |
The Hype about Hydrogen: Fact and Fiction in the Race to Save the Climate |
2005 | •• |
27790 |
|
Feitelberg S. |
Net Worth Workout: A Powerful Program for a Lifetime of Financial Fitness |
2005 | •• |
27799 |
|
Howard M., LeBlanc D., Viega J. |
19 Deadly Sins of Software Security: Programming Flaws and How to Fix Them |
2005 | •• |
27803 |
|
Sobell M.G. |
A Practical Guide to Linux® Commands, Editors, and Shell Programming |
2005 | •• |
27809 |
|
Kluge W. |
Abstract Computing Machines |
2005 | •• |
27812 |
|
Hunter L.E. |
Active Directory Field Guide |
2005 | •• |
27821 |
|
Dobbertin H. (ed.), Rijmen V. (ed.), Sowa A. (ed.) |
Advanced Encryption Standard - AES: 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers |
2005 | •• |
27824 |
|
Rammer I., Szpuszta M. |
Advanced .NET Remoting |
2005 • | •• |
27841 |
|
Otto S.R., Denier J.P. |
An Introduction to Programming and Numerical Methods in MATLAB |
2005 | •• |
27846 |
|
Gunther N.J. |
Analyzing Computer Systems Performance |
2005 | •• |
27850 |
|
Jalote P. |
An integrated approach to software engineering |
2005 • | •• |
27857 |
|
Adamatzky A., Komosinski M. |
Artificial Life Models in Software |
2005 | •• |
27858 |
|
Hoya T. |
Artificial Mind System: Kernel Memory Approach |
2005 | •• |
27867 |
|
Li S., Knudsen J. |
Beginning J2ME: From Novice to Professional |
2005 • | •• |
27868 |
|
Barker J. |
Beginning Java Objects |
2005 • | •• |
27872 |
|
Rothman J., Derby E. |
Behind Closed Doors |
2005 | •• |
27884 |
|
Gomillion D., Dempster B. |
Building Telephony Systems with Asterisk |
2005 | •• |
27897 |
|
Rothe J. |
Complexity Theory and Cryptology: An Introduction to Cryptocomplexity |
2005 | •• |
27905 |
|
Zhang H. |
Computer Graphics Using Java 2D and 3D |
2005 | •• |
27906 |
|
Kizza J.M. |
Computer Network Security |
2005 • | •• |
27908 |
|
Lee D.T., Tygar J.D., Shieh S.P. (Ed) |
Computer Security in the 21st Century |
2005 | •• |
27919 |
|
Rodarmor W., Crete D., Daveau G. |
Creating Photomontages with Photoshop: A Designer's Notebook |
2005 • | •• |
27923 |
|
Welschenbach M., Kramer D. |
Cryptography in C and C++ |
2005 • | •• |
27934 |
|
Drake P. |
Data Structures and Algorithms in Java |
2005 • | •• |
27954 |
|
Minutella D., Cioara J., Stevenson H. |
CCNA® Exam Prep™ (Exam 640-801) |
2005 | •• |
27955 |
|
Edwards W., Jack T., Lammle T. |
CCNP: Complete Study Guide |
2005 | •• |
27963 |
|
Salomon D. |
Coding for data and computer communications |
2005 | •• |
27970 |
|
Tidwell J. |
Designing Interfaces |
2005 | •• |
27979 |
|
Veeravalli B., Barlas G. |
Distributed Multimedia Retrieval Strategies for Large Scale Networked Systems |
2005 | •• |
27980 |
|
Keith J. |
DOM Scripting |
2005 | •• |
27987 |
|
Killpack R. |
eDirectory Field Guide |
2005 | •• |
28007 |
|
Selly D., Barnaby T., Troelsen A. |
Expert ASP.NET 2.0 Advanced Application Design |
2005 | •• |
28009 |
|
Salomon D. |
Foundations of Computer Security |
2005 | •• |
28018 |
|
Ma Z. |
Fuzzy Database Modeling with XML |
2005 | •• |
28019 |
|
Bhangal Sh., Besley K. |
Foundation Flash 8 |
2005 | •• |
28038 |
|
Gunther N.J. |
Guerilla Capacity Planning |
2005 • | •• |