انتشارات Ieee Computer Soc Pr
Semi-invasive attacks A new approach to hardware security analysis
Skorobogatov Sergei P., 2005
Provably Secure Steganography
Nicholas J Hopper, 2002
Elements of Artificial Intelligence: An Introduction Using LISP
Steven L. Tanimoto, 1990
Advanced 3D Photorealism Techniques
Bill Fleming, 1999
A category-theoretic approach to the semantics of programming languages
Frank Joseph Oles, 1982
Compilers and compiler generators: an introduction with C++
Patrick D. Terry, 1997
Compliers and Compiler Generators: An Introduction With C++
Patrick D. Terry, 1997
Macromedia Flash Professional 8 Unleashed
David/ Wilson, Eddie/ Barber, Lou Vogeleer, 2005
An Introduction to the Theory of Computation
Eitan Gurari, 1989
Introduction to the theory of computation
Eitan Gurari, 1989
Sams Teach Yourself MySQL in 21 Days
Mark Mazlakowski, 2000
Write Good or Die
Scott Nicholson, 2010
Fundamentals of data structures
Ellis Horowitz, 1982
Fundamentals of data structures in Pascal
Horowitz E., 1994,
Exam Cram 2: CISA
Allen/ Mortier, 2005
Source Book on Digital Libraries
Edward A. Fox, 1993
Top-Down Calculus: A Concise Course (Computers and Math Series)
S. Gill Williamson, 1987
Weaving a Program: Literate Programming in Web
Wayne Sewell, 1989
Formal methods for concurrency
Clive Fencott, 1996
Software Testing Techniques
Boris Beizer, 1990
A really temporal logic
Rajeev Alur, 2007
A really temporal logic
Rajeev Alur, 2007
