29110 |
|
Zegarelli M. |
Logic For Dummies |
2006 | •• |
29114 |
|
Regan Sch., White K. |
Mac OS X Server 10.4 Tiger: Visual QuickPro Guide |
2006 | •• |
29129 |
|
Gottschalk P. |
Knowledge Management Systems in Law Enforcement: Technologies and Techniques |
2006 | •• |
29130 |
|
Jetter A. (Ed), Wijnhoven F., Kraaijenbrink J. |
Knowledge Integration: The Practice of Knowledge Management in Small and Medium Enterprises |
2006 • | •• |
29134 |
|
Reynolds D. |
.Mac with iWeb (Visual QuickStart Guide Series) |
2006 • | •• |
29152 |
|
Meyler K., Amaris, Fuller |
Microsoft Operations Manager 2005 Unleashed: With a Preview of Operations Manager 2007 |
2006 | •• |
29160 |
|
Shapiro J., Bowman S. |
Microsoft SQL Server 2005: The Complete Reference |
2006 • | •• |
29165 |
|
Tsoulos G. |
MIMO Antenna Technology for Wireless Communications |
2006 | •• |
29168 |
|
Cook D.J. (Ed), Holder L.B. (Ed) |
Mining Graph Data |
2006 | •• |
29170 |
|
Hruby P., Kiehn J., Scheller Ch.V. |
Model-Driven Design Using Business Patterns |
2006 • | •• |
29173 |
|
Wagner F., Thomas |
Modeling Software with Finite State Machines: Practical Approach |
2006 | •• |
29177 |
|
van der Schaar M., Turaga D., Stockhammer Th. |
MPEG-4 beyond Conventional Video Coding: Object Coding, Resilience and Scalability |
2006 | •• |
29178 |
|
Zivanovic M.D., Vukobratovic M. |
Multi-Arm Cooperating Robots: Dynamics and Control |
2006 | •• |
29179 |
|
Yezid D., Fabregat R. |
Multi-Objective Optimization in Computer Networks Using Metaheuristics |
2006 | •• |
29180 |
|
Knobbe A.J. |
Multi-Relational Data Mining: Volume 145 Frontiers in Artificial Intelligence and Applications |
2006 | •• |
29185 |
|
Ding J., Schmidt D., Gower J.E. |
Multivariate Public Key Cryptosystems |
2006 | •• |
29186 |
|
Magid L., Collier A. |
MySpace Unraveled: A Parent's Guide to Teen Social Networking from the Directors of BlogSafety.com |
2006 | •• |
29193 |
|
Clemm A. |
Network Management Fundamentals |
2006 | •• |
29200 |
|
Spink A. (Ed), Cole Ch. (Ed) |
New Directions in Human Information Behavior |
2006 • | •• |
29201 |
|
Haykin S. (Ed), Sejnowski T.J. (Ed), McWhirter J. (Ed) |
New Directions in Statistical Signal Processing: From Systems to Brains |
2006 | •• |
29203 |
|
Fujita H. (Ed), Mejri M. |
New Trends in Software Methodologies, Tools and Techniques: Proceedings of the fifth SoMeT_06, Volume 147 Frontiers in Artificial Intelligence and Applications |
2006 | •• |
29204 |
|
Pandya M., Warner S., Brown J. |
Nightly Business Report Presents Lasting Leadership: What You Can Learn from the Top 25 Business People of our Times |
2006 | •• |
29205 |
|
Edwards J., Martin A., Bramante R. |
Nortel Guide to VPN Routing for Security and VoIP |
2006 | •• |
29222 |
|
Negus C. |
Live Linux CDs: Building and Customizing Bootables (Negus Live Linux Series) |
2006 | •• |
29228 |
|
Lau H.T. |
A Java Library of Graph Algorithms and Optimization |
2006 | •• |
29229 |
|
Ogunfunmi T. (Ed) |
Adaptive Nonlinear System Indentification: The Volterra and Wiener Model Approaches |
2006 • | •• |
29246 |
|
Meyers M. |
A+ Certification All-in-One Exam Guide |
2006 | •• |
29247 |
|
Trajkovski G., Idea Group Publishing |
Imitation-Based Approach to Modeling Homogenous Agents Societies |
2006 | •• |
29249 |
|
Mollin Richard a Staff, Mollin R.A. |
Introduction to Cryptography |
2006 • | •• |
29256 |
|
Kott A., McEneaney W. (ed.) |
Adversarial Reasoning: Computational Approaches to Reading the Opponents Mind |
2006 | •• |
29258 |
|
Kersting K. |
An Inductive Logic Programming Approach to Statistical Relational Learning: Volume 148 Frontiers in Artificial Intelligence and Applications |
2006 | •• |
29259 |
|
White T. |
Animation from Pencils to Pixels: Classical Techniques for the Digital Animator |
2006 | •• |
29263 |
|
Zha X.F. |
Artificial Intelligence and Integrated Intelligent Information Systems: Emerging Technologies and Applications |
2006 | •• |
29270 |
|
Isbister K. |
Better Game Characters by Design: A Psychological Approach |
2006 | •• |
29274 |
|
Eernisse M. |
Build Your Own AJAX Web Applications |
2006 | •• |
29303 |
|
Levitin G. (ed.) |
Computational Intelligence in Reliability Engineering: Evolutionary Techniques in Reliability Analysis and Optimization |
2006 | •• |
29306 |
|
Millis D.L. |
Computer Network Time Synchronization: The Network Time Protocol |
2006 | •• |
29317 |
|
Curtis K. |
Embedded Multitasking |
2006 | •• |
29324 |
|
Hassanaly P. (Ed), Herrmann T. (Ed), Kunau G. |
Cooperative Systems Design: Seamless Integration of Artifacts and Conversations - Enhanced Concepts of Infrastructure for Communication |
2006 | •• |
29331 |
|
Asama H. (Ed), Thrun S. (Ed), Prassler E. (Ed) |
Field and Service Robotics: Recent Advances in Reserch and Applications |
2006 | •• |
29332 |
|
Corke P. (Ed), Sukkarieh S. (Ed) |
Field and Service Robotics: Results of the 5th International Conference Fsr by Peter Corke (Editor), Salah Sukkarieh (Editor) |
2006 | •• |
29334 |
|
Lamont G.B., Van Veldhuizen D.A. |
Evolutionary Algorithms for Solving Multi-Objective Problems |
2006 • | •• |
29341 |
|
Ahlswede R., Blinovsky V., Cai N. (Ed) |
General Theory of Information Transfer and Combinatorics |
2006 | •• |
29347 |
|
Kanellis P. (Ed), Kiountouzis E. (Editor) |
Digital Crime and Forensic Science in Cyberspace |
2006 | •• |
29352 |
|
Rossi F. (Ed), Walsh T. (Ed), Van Beek P. |
Handbook of Constraint Programming |
2006 | •• |
29357 |
|
Lerner K.L. (ed.), Lerner B.W. (ed.) |
Crime and Punishment: Essential Primary Sources |
2006 | •• |
29367 |
|
Bandyopadhyay S., Roy S., Ueda T. |
Enhancing the Performance of Ad Hoc Wireless Networks with Smart Antennas |
2006 | •• |
29381 |
|
Al-Hakim L. |
Information Quality Management: Theory and Applications |
2006 | •• |
29382 |
|
Krause M. |
Information Security Management Handbook, Volume 3 |
2006 • | •• |
29393 |
|
Stahl B.C.C. |
Issues and Trends in Technology and Human Interaction |
2006 | •• |