انتشارات Addison
Building secure software: how to avoid security problems the right way
John Viega, Gary McGraw., 2002
Natural Resource and Environmental Economics
Roger Perman, Yue Ma, Michael Common, David Maddison, James McGilvray, 2011
Real-Time Agility: The Harmony/ESW Method for Real-Time and Embedded Systems Development
Bruce Powel Douglass, 2009
Refactoring Databases: Evolutionary Database Design (Addison-Wesley Signature Series (Fowler))
Scott J Ambler, Pramod J. Sadalage, 2006
Spring Into Technical Writing for Engineers and Scientists: For Engineers and Scientists
Barry J. Rosenberg, 2005
SQL Server Forensic Analysis
Kevvie Fowler, 2008
Telecommunications Essentials, Second Edition: The Complete Global Source
Lillian Goleniewski, Kitty Wilson Jarrett, 2006
The Economics of Iterative Software Development: Steering Toward Better Business Results: The Economics of Iterative Development
Walker Royce, Kurt Bittner, Michael Perrow, 2009
The Nomadic Developer: Surviving and Thriving in the World of Technology Consulting
Aaron Erickson, 2009
TSP(SM) Coaching Development Teams (SEI Series in Software Engineering)
Watts S. Humphrey, 2006
Compiling with C# and Java
Pat Terry, 2004
Cocoa Design Patterns
Erik M. Buck; Donald A. Yacktman, 2009
The Art of Computer Virus Research and Defense
Peter Szor, 2005
Building Secure Software: How to Avoid Security Problems the Right Way
John Viega; Gary McGraw, 2001
Computer networking : a top-down approach featuring the Internet
James F. Kurose; Keith W. Ross, 2000
The Indispensible Guide to C with Engineering Applications
P. Davies, 1995
Enterprise Software Delivery
Alan W. Braun, 2012
Scala for the Impatient
Cay S. Horstmann, 2012
Java Design Patterns A Tutorial
James W. Cooper, 2000
