Книга | Страницы для поиска |
Воройский Ф.С. — Информатика. Новый систематизированный толковый словарь | 343, 372 |
Кайт Т. — Oracle для профессионалов (Книга 1. Архитектура и основные особенности) | 83 |
Мак Клар С., Шах С., Шах Ш. — Хакинг в Web: атаки и защита | 70, 78, 226, 247 |
Кан М.Н. — Технический анализ | 182 |
Макнамара Д. — Секреты компьютерного шпионажа: Тактика и контрмеры | 35 |
Администрирование Microsoft SQL Server 2000 | 5 |
Проектирование и реализация баз данных Microsoft SQL Server 2000. Учебный курс MCAD/ MCSE, MCDBA | 206 |
Khosrowpour M. — Encyclopedia Of Information Science And Technology | 1095, 2129 |
Graham R.L., Grotschel M., Lovasz L. — Handbook of combinatorics (vol. 1) | 556, 1602, 1620—1622, 1625—1627 |
Berman F., Fox G., Hey T. (eds.) — Grid Computing | 363 |
Minoli D. — A Networking Approach to Grid Computing | 52, 54 |
Havey M. — Essential Business Process Modeling | |
Gagnt M. — Moving to Ubuntu Linux | |
Graham — Building Web Services with Java: Making Sense of XML, SOAP, WSDL and UDDI | |
Bauer M.D. — Linux Server Security | |
Graham R.L., Grotschel M., Lovasz L. — Handbook of combinatorics (vol. 2) | 556, 1602, 1620-1622, 1625—1627 |
Hoffman K., Kruger L. — Visual C#.NET 2003 Unleashed | |
Steen S.W.P. — Mathematical Logic with Special Reference to the Natural Numbers | 366, 379, 553 |
Mathers T.W. — Windows® Server™ 2003/2000 terminal server solutions | |
Patrick T., Craig J. — Visual Basic 2005 Cookbook: Solutions for VB 2005 Programmers | |
Bowman R. — Visual Basic.Net: Your Visual Blueprint for Building Versatile Programs on the .NET Framework | 3 |
Fehily C. — SQL (Visual QuickStart Guide) | [See IBM DB2] |
Molinaro A. — SQL Cookbook | |
Cumming A., Russell G. — SQL Hacks | |
Kline K.E. — SQL in a Nutshell | |
Bach E., Shallit J. — Algorithmic Number Theory (том 1) | 49 |
Mayo J. — C# Builder KickStart | |
Blanchette J., Summerfield M. — C++ GUI Programming with Qt 3 | |
Blanchette J., Summerfield M. — C++ GUI Programming with Qt 4 | |
Wegener I. — Complexity of Boolean Functions | 270, 307 |
Grotschel M., Lovasz L., Schrijver A. — Geometric Algorithms and Combinatorial Optimization | 26—29, 27 |
Zimand M. — Computational Complexity: A Quantitative Perspective | 85 |
Engel K. — Sperner theory | 31 |
Cunningham L.A. — How To Think Like Benjamin Graham and Invest Like Warren Buffett | 211 |
Ash C.J., Knight J., Sevenster A. (Ed) — Computable Structures and the Hyperarithmetical Hierarchy | 14 |
Marks E.A., Werrell M.J. — Executive's Guide to Web Services | 10, 55, 173, 178, 182—183, 185—186, 191, 194—195, 197, 201 |
Sipser M. — Introduction to the theory of computation | 232, 348 |
Papadimitriou C.H. — Computational Complexity | 339, 340 |
Purdom R.W., Brown C.A. — The analysis of algorithms | 414 |
Li M., Vitanyi P. — An introduction to Kolmogorov complexity and its applications | 38, 40, 462, 481—483, 488—492, 494 |
Patterson D.A., Hennessy J.L. — Computer Organization and Design: The Hardware/Software Interface | CD8.11:5 |
Mahmoud H.M. — Sorting: a distribution theory | 27 |
Monk J.D. — Mathematical Logic | 105 |
Мячев А.А. — Персональные ЭВМ: краткий энциклопедический справочник | 270 |
Лебедев А.Н. — Самоучитель по Visual FoxPro 9.0 | 40 |
Бланшет Ж., Саммерфилд М. — QT 4: программирование GUI на C++ | 345 |
Koblitz N., Wu Y.-H., Menezes A.J. — Algebraic Aspects of Cryptography | 40 |
Марков А.С., Лисовский К.Ю. — Базы данных. Введение в теорию и методологию | 494 |
Grünbaum B. — Convex Polytopes | 52b |
Warren A. Jr. Hunt — Fm8501: A Verified Microprocessor | 305 |
Marshal B. — XML by example | 37, 224 |
Ullman J.D. — Principles of database systems | 172 |
Barwise J. (ed.) — Handbook of Mathematical Logic | 540, 633 |
Kozen D.C. — The Design And Analysis Of Algorithms | 117 |
Feldt R., Johnson L., Neumann M. — Ruby Developer's Guide | 136, 141, 179 |
Kumar P., D'Ariano G.M., Hirota O. — Quantum communication, computing, and measurement 2 | 310 |
Watanabe O. (ed.) — Kolmogorov Complexity and Computational Complexity | 9, 12, 13, 18, 26 |
Kaye R. — Models of Peano Arithmetic | 9, 34—5, 174-5 |
Koblitz N., Menezes A.J. (Contributor), Wu Y.-H. (Contributor) — Algebraic Aspects of Cryptography | 40 |
Ding-Zhu D., Ker-I K. — Problem solving in automata, languages, and complexity | 371 |
Marmanis H., Babenko D. — Algorithms of the intelligent web | 9, 15 |
Chase R.B., Jacobs E.R. — Operations management for competitive advantage | 500, 506, 576, 629 |
Сеппа Д. — Microsoft ADO NET | 3, 8, 47, 59, 61, 150, 414 |
Lecky-Thompson G.W. — Corporate Software Project Management | 46 |
Sudan M. — Efficient Checking of Polynomials and Proofs and the Hardness of Approximation Problems | 4, 12 |
Leeuwen J.V. — Handbook of Theoretical Computer Science: Algorithms and Complexity | 74, 128, 136, 241, 243, 776 |
Stinson D.R. — Cryptography: Theory and practice | 122 |
Hopcroft J.E., Ullman J.D. — Introduction to automata theory, languages, and computation | 209—213, 362—365, 371 |
Katz V.J. — A History of Mathematics: An Introduction | 46 |
Leeuwen J. (ed.), Meyer A.R., Nivat M. — Algorithms and Complexity, Volume A | 74,128,136,241,243,776 |
Salomaa A. — Computation and automata | 110 |
Percival D.B., Walden A.T. — Wavelet methods for time series analysis | 420 |
Hinman P.G. — Fundamentals of Mathematical Logic | 734 |
Воройский Ф.С. — Информатика. Энциклопедический словарь-справочник: введение в современные информационные и телекоммуникационные технологии в терминах и фактах | 85, 107, 315, 344, 517 |
Du D.-Z., Ko K.-I. — Theory of computational complexity | 58, 397 |
Suppes P.(ed.) — Handbook of Proof Theory.Studies in logic the foundations of mathematics.Volume 137. | 106 |
Гладких Б.А. — Информатика от абака до интернета. Введение в специальность | 154, 241 |
Steen S. — Mathematical Logic with Special Reference to the Natural Numbers | 366, 379, 553 |
Sipser M. — Introduction to the Theory of Computation | 211, 318 |
Фридланд А.Я., Ханамирова Л.С., Фридланд И.А. — Информатика и компьютерные технологии. Основные термины. Толковый словарь | 247 |
Jacky J. — The Way of Z: Practical Programming with Formal Methods | 9—10, 149, 198 |
Nienhuys-Cheng S., Wolf R. — Foundations of Inductive Logic Programming | 181, 184, 186, 330 |
Nievergelt J., Farrar J.C., Reingold E.M. — Computer approaches to mathematical problems | 105—109, 139, 246 |
Abramsky S., Barwise J., Fine K. — Recursive Functionals. Studies in Logic and the Foundations of Mathematics Volume 131 | 112 |
Truss J.K. — Foundations of Mathematical Analysis | 291 |
Truss J. — Foundations of mathematical analysis | 291 |
J. K. Truss — Foundations of mathematical analysis MCet | 291 |