Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
Ìåõìàòÿíàì
square Ïåðâûé êóðñ

square Âòîðîé êóðñ

square Òðåòèé êóðñ

square ×åòâåðòûé êóðñ

square Ïÿòûé êóðñ
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
Êðàñîòà
blank
blank
Áûñòðûé ïåðåõîä
Ïî íàçâàíèþ:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z À Á Â Ã Ä Å ¨ Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
Ïî àâòîðó:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ¨ À Á Â Ã Ä Å Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
blank
Âñå ðåñóðñû
Ñîðòèðîâêà:

ID asc desc pic Àâòîðû asc desc Íàçâàíèå asc desc Ãîä asc desc Äîï.
24965 Kandlikar S.G., King M.R., Li D. Heat Transfer and Fluid Flow in Minichannels and Microchannels 2005
24968 Lappa M. Fluids, Materials and Microgravity: Numerical Techniques and Insights into the Physics 2005
24978 Gabbay D.M. (ed.), Guenthner F. (ed.) Handbook of Philosophical Logic (Volume 12) 2005
24979 Gabbay D.M. (ed.), Guenthner F. (ed.) Handbook of Philosophical Logic (Volume 13) 2005
24986 Grattan-Guiness I. (ed.) Landmark Writings in Western Mathematics 1640-1940 2005
24990 Bobrowski A. Functional Analysis for Probability and Stochastic Processes 2005
24991 Êîðîòàåâ À.Â., Ìàëêîâ À.Ñ., Õàëòóðèíà Ä.À. Çàêîíû èñòîðèè. Ìàòåìàòè÷åñêîå ìîäåëèðîâàíèå èñòîðè÷åñêèõ ìàêðîïðîöåññîâ. Äåìîãðàôèÿ, ýêîíîìèêà, âîéíû 2005
24996 Åðîõèí Ì.Í. (ðåä.) Äåòàëè ìàøèí è îñíîâû êîíñòðóèðîâàíèÿ 2005
25017 Turkle Sh. The Second Self: Computers and the Human Spirit - Twentieth Anniversary Edition 2005
25018 Reuvid J. The Secure Online Business Handbook: E-commerce, IT Functionality and Business Continuity 2005
25020 Prandi M. The Unofficial Guide to Managing Rental Property (Unofficial Guides Series) 2005
25022 Santi P. Topology Control in Wireless Ad Hoc and Sensor Networks 2005
25024 Ghenassia F. Transaction Level Modelling Methodology 2005
25029 Bernstein L., Yuhas C.M. Trustworthy Systems Through Quantitative Software Engineering 2005
25030 Nekoogar F. ULTRA Wideband Communications: Fundamentals and Application 2005
25035 El-Ghazawi T., Carlson W., Sterling Th. Upc: Distributed Shared Memory Programming 2005
25038 Unhelkar Bh. Verification and Validation for Quality of Uml 2. 0 Models 2005
25040 Stephens R. Visual Basic 2005 Programmer's Reference 2005
25051 Lin Y.-B., Pang A.-Ch. Wireless and Mobile All-IP Networks 2005
25052 Ahmad A. Wireless and Mobile Data Networks 2005
25054 Briere D.D., Hurley P., Hurley P.J. Wireless Network Hacks and Mods for Dummies 2005
25065 Bulusu N., Jha S. Wireless Sensor Networks 2005
25072 Luo F.L., Ye H. Essential DC/DC Converters 2005
25076 Shung K.K. Diagnostic Ultrasound: Imaging and Blood Flow Measurements 2005
25085 Oppliger R. Contemporary Cryptography 2005
25090 Säckinger E. Broadband Circuits for Optical Fiber Communication 2005
25094 Glushko R.J., McGrath T. Document Engineering: Analyzing and Designing Documents for Business Informatics and Web Services 2005
25099 Harbour J.S. Beginning Game Programming 2005
25105 Clarke I., Flaherty T.B. Advances in Electronic Marketing 2005
25106 Hunt J. Agile Software Construction 2005
25124 Francus P. Image Analysis, Sediments and Paleoenvironments 2005
25131 Ye J., Cundiff S.T. Femtosecond Optical Frequency Comb Technology: Principle, Operation and Applications 2005
25135 IT Governance Institute Governance of the Extended Enterprise: Bridging Business and IT Strategies 2005
25144 Eckert J., Schitka M.J. Linux+ 2005 In Depth 2005
25147 Lachev T. Microsoft Reporting Services in Action 2005
25151 MySQL AB MySQL Language Reference 2005
25153 Gaiti D., Galmes S., Puigjaner R. (eds.) Network Control and Engineering for QOS, Security and Mobility, III 2005
25154 Kaufman A.S., Lichtenberger E.O., Fletcher-Janzen E. Essentials of KABC-II Assessment 2005
25160 Jue J.P., Vokkarane V.M. Optical Burst Switched Networks 2005
25161 Cusumano M., Shirky C., Feller J. Perspectives on Free and Open Source Software 2005
25162 James L. Phishing Exposed 2005
25165 Robinson P., Vogt H., Wagealla W. Privacy, Security and Trust within the Context of Pervasive Computing 2005
25174 Bundy A., Basin D., Hutter D. Rippling: Meta-Level Guidance for Mathematical Reasoning 2005
25176 Sutcliffe N., Nakayama M. Managing It Skills Portfolios: Planning, Acquisition and Performance Evaluation 2005
25179 Johnson R.S. Singular Perturbation Theory: Mathematical and Analytical Techniques with Applications to Engineering 2005
25182 Gottschalk P. Strategic Knowledge Management Technology 2005
25189 Tzfira T., Citovsky V. Nuclear Import and Export in Plants and Animals 2005
25195 Berger T.W., Glanzman D.L. (eds.) Toward Replacement Parts for the Brain: Implantable Biomimetic Electronics as Neural Prostheses 2005
25209 Premier Development, Skelnik Ch., Gibbs V. Roland VS Recorder Power! 2005
25213 Kaveney R. From Alien to The Matrix: Reading Science Fiction Film 2005


blank
HR
@Mail.ru
© Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2024
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01!| Valid CSS! Î ïðîåêòå