انتشارات Rtb Press
Foundations of Cryptography: Volume 1, Basic Tools (Vol 1)
Oded Goldreich, 2001
Identity-Based Cryptography
M. Joye, M. Joye, G. Neven, 2009
Number theory and cryptography
J. H. Loxton, 1990
Public key cryptography: applications and attacks
Lynn Margaret Batten, 2013
A Practical English Grammar: Exercises 2 (Bk. 2)
A. J. Thomson, A. V. Martinet, 1986
Access 2010: The Missing Manual
Matthew MacDonald, 2010
Clustering
Rui Xu, Don Wunsch, 2008
Data Mining with Microsoft® SQL Server™ 2000 Technical Reference
Claude Seidman, 2001
DB2 9 Fundamentals Certification Study Guide
Roger E. Sanders, 2007
DB2 for z/OS Version 8 DBA Certification Guide
Susan Lawson, 2004
DB2 SQL tuning tips for z/OS developers
Tony Andrews, 2013
DB2 Version 8: The Official Guide
Paul C. Zikopoulos, George Baklarz, Dirk deRoos, Roman B. Melnyk, 2003
Einstieg in SQL: Verstehen, einsetzen, nachschlagen, 4. Auflage
Marcus Throll, Oliver Bartosch, 2010
FileMaker Pro 10: The Missing Manual
Susan Prosser, Geoff Coffey, 2009
FileMaker Pro 10: The Missing Manual
Susan Prosser, Geoff Coffey, 2009
FileMaker Pro 8: The Missing Manual
Susan Prosser, Geoff Coffey, 2009
Communicating Process Architectures 2007: WoTUG-30
A. A. Mcewan, 2007
Compositing Visual Effects Essentials for the Aspiring Artist
Steve Wright, 2008
Compositing Visual Effects: Essentials for the Aspiring Artist
Steve Wright, 2007
Copy, Rip, Burn: The Politics of Copyleft and Open Source
David Berry, 2008
Designing for Situation Awareness: An Approach to User-Centered Design
Mica R. Endsley, 2003
Digital Compositing for Film and Video
Steve Wright, 2001
Digital Compositing for Film and Video,
Steve Wright, 2006
