انتشارات Iris Press
English Grammar in Use. 4-edition
Murphy R., 2012
English grammar in use: a self-study guide
Raymond Murphy, 1994
CCNP Security SISAS 300-208 Official Cert Guide
Aaron T. Woland, Kevin Redmon, 2015
Creationism's Trojan Horse: The Wedge of Intelligent Design
Barbara Forrest, Paul R. Gross, 2004
Defending Cyberspace, and Other Metaphors
Martin C. Libicki, 1997
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It
Jesse Varsalone, Matthew Mcfadden et al., 2011
Designing BSD Rootkits: An Introduction to Kernel Hacking
Joseph Kong, 2007
Designing BSD Rootkits: An Introduction to Kernel Hacking
Joseph Kong, 2007
Designing BSD Rootkits: An Introduction to Kernel Hacking
Joseph Kong, 2007
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Justin Seitz, 2009
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Justin Seitz, 2009
English Grammar: An Outline
Rodney Huddleston, 1988
English Grammar: Understanding the Basics
Evelyn P. Altenberg, Robert M. Vago, 2010
English Grammar: Understanding the Basics
Evelyn P. Altenberg, Robert M. Vago, 2010
Hacker culture
Douglas Thomas, 2002
A Guide to Claims-Based Identity and Access Control (Patterns & Practices)
Dominick Baier, Vittorio Bertocci, Keith Brown, Matias Woloski, Eugenio Pace, 2010
A Theory of Virtue: Excellence in Being for the Good
Robert Merrihew Adams, 2006
A Theory of Virtue: Excellence in Being for the Good
Robert Merrihew Adams, 2006
Access 2007: The Missing Manual
Matthew MacDonald, 2006
