انتشارات John Cox
AAA and network security for mobile access: radius, diameter, EAP, PKI and IP mobility
MadjidNakhjiri, Mahsa Nakhjiri, 2005
Advanced wireless networks: 4G technologies
Savo G. Glisic, 2006
An Annotated Bibliography of Nineteenth-Century Grammars of English
Manfred Görlach, Ian Michael, 1998
An Introduction to the Grammar of English
Elly van Gelderen, 2010
An Introduction to the Grammar of English, Revised Edition
Elly van Gelderen, 2010
An Introduction to the Grammar of English: Syntactic Arguments and Socio-historical Backgrounds
Elly Van Gelderen, 2002
Analysis Without Anguish: Version 12.0 For Windows (v. 12)
Sheridan J. Coakes, 2007
Analysis of Financial Data
Gary Koop, 2006
A Programming Language
Kenneth E. Iverson, 1962
A Programming Language.
Kenneth E. Iverson, 1962
Educated Fiji English: Lexico-grammar and variety status
Lena Zipp, 2014
UML 2 Semantics and Applications
Kevin Lano, 2009
Verification and validation for quality of UML 2.0 models
Bhuvan Unhelkar, 2005
370/360 Assembler Language Programming
Nancy B. Stern, etc., 1979
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit
John Chirillo, 2001
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit
John Chirillo, 2001
Ajax For Dummies®
Steve Holzner PhD, 2006
Applied XML: a toolkit for programmers
Alex Ceponkus, Faraz Hoodbhoy, 1999
Beginning XML
David Hunter; Jeff Rafter; Joe Fawcett, 2007
Beginning XML
David Hunter; Jeff Rafter; Joe Fawcett, 2007
CMS Security Handbook: The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone
Matthew Langham; Carsten Ziegeler, 2011
Drupal 7 Bible
Ric Shreves, 2011
