انتشارات Next Step Press
Adobe Dreamweaver CS5 with PHP: Training from the Source
David Powers, 2010
Insulated Gate Bipolar Transistor IGBT Theory and Design
Frank Mittelbach, Michel Goossens, Johannes Braams, David Carlisle, Chris Rowley, 2003
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz, 2014
English Grammar in Use, New edition, With Answers - 2nd Edition (Intermediate Level)
Raymond Murphy, 2001
English Grammar in Use. 4-edition
Murphy R., 2012
English grammar in use: a self-study guide
Raymond Murphy, 1994
CCNP Security SISAS 300-208 Official Cert Guide
Aaron T. Woland, Kevin Redmon, 2015
Creationism's Trojan Horse: The Wedge of Intelligent Design
Barbara Forrest, Paul R. Gross, 2004
Defending Cyberspace, and Other Metaphors
Martin C. Libicki, 1997
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It
Jesse Varsalone, Matthew Mcfadden et al., 2011
Designing BSD Rootkits: An Introduction to Kernel Hacking
Joseph Kong, 2007
Designing BSD Rootkits: An Introduction to Kernel Hacking
Joseph Kong, 2007
Designing BSD Rootkits: An Introduction to Kernel Hacking
Joseph Kong, 2007
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Justin Seitz, 2009
