انتشارات Wiley E Text
CSS Hacks and Filters: Making Cascading Stylesheets Work
Joseph W. Lowery, 2005
Cyber security policy guidebook
Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus Sachs, Jeffrey Schmidt, Joseph Weiss, 2012
Defeating the Hacker: A Non-Technical Guide to Computer Security
Robert Schifreen, 2006
Defending the Digital Frontier: A Security Agenda
Ernst & Young LLP, Mark W. Doll, Sajai Rai, Jose Granado, 2002
Geek House: 10 Hardware Hacking Projects for Around Home
Barry Press, Marcia Press, 2005
Geek House: 10 Hardware Hacking Projects for Around Home (ExtremeTech)
Barry Press, Marcia Press, 2005
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit
John Chirillo, 2001
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit
John Chirillo, 2001
Hack Attacks Testing: How to Conduct Your Own Security Audit
John Chirillo, 2002
English Grammar Workbook For Dummies
Geraldine Woods, 2006
English grammar workbook for dummies
Geraldine Woods, 2006
Hacking BlackBerry: ExtremeTech
Glenn Bachmann, 2006
Access 2003 Bible
Cary N. Prague, Michael R. Irwin, Jennifer Reardon, 2004
Access 2003 Bible
Cary N. Prague, 2003
Access 2007 Bible
Michael R. Groh, Joseph C. Stockman, Gavin Powell, Cary N. Prague, Michael R. Irwin, Jennifer Reardon, 2007
Access 2007 Bible
Michael R. Groh, Joseph C. Stockman, Gavin Powell, Cary N. Prague, Michael R. Irwin, Jennifer Reardon, 2007
Beginning Excel Services
Liviu Asnash, Eran Megiddo, Craig Thomas, 2007
Beginning Excel Services
Liviu Asnash, Eran Megiddo, Craig Thomas, 2007
Behavioral Biometrics - Remote Access Approach
Kenneth Revett, 2008
Capital: The Story of Long-Term Investment Excellence
Ellis Ch.D., 2004
CIO Survival Guide: The Roles and Responsibilities of the Chief Information Officer
Karl D. Schubert, 2004
Cognitive Radio and Dynamic Spectrum Access
Lars Berlemann, Stefan Mangold, 2009
