انتشارات Xml Press
Cryptography: Theory and Practice
Douglas Stinson, 1995
Everyday cryptography: Fundamental principles and applications
Keith M. Martin, 2012
Everyday cryptography: Fundamental principles and applications
Keith M. Martin, 2012
Foundations of Cryptography: Volume 1, Basic Tools (Vol 1)
Oded Goldreich, 2001
Identity-Based Cryptography
M. Joye, M. Joye, G. Neven, 2009
Number theory and cryptography
J. H. Loxton, 1990
Public key cryptography: applications and attacks
Lynn Margaret Batten, 2013
A Practical English Grammar: Exercises 2 (Bk. 2)
A. J. Thomson, A. V. Martinet, 1986
Access 2010: The Missing Manual
Matthew MacDonald, 2010
Clustering
Rui Xu, Don Wunsch, 2008
Data Mining with Microsoft® SQL Server™ 2000 Technical Reference
Claude Seidman, 2001
DB2 9 Fundamentals Certification Study Guide
Roger E. Sanders, 2007
DB2 for z/OS Version 8 DBA Certification Guide
Susan Lawson, 2004
DB2 SQL tuning tips for z/OS developers
Tony Andrews, 2013
DB2 Version 8: The Official Guide
Paul C. Zikopoulos, George Baklarz, Dirk deRoos, Roman B. Melnyk, 2003
Einstieg in SQL: Verstehen, einsetzen, nachschlagen, 4. Auflage
Marcus Throll, Oliver Bartosch, 2010
FileMaker Pro 10: The Missing Manual
Susan Prosser, Geoff Coffey, 2009
FileMaker Pro 10: The Missing Manual
Susan Prosser, Geoff Coffey, 2009
FileMaker Pro 8: The Missing Manual
Susan Prosser, Geoff Coffey, 2009
Communicating Process Architectures 2007: WoTUG-30
A. A. Mcewan, 2007
Compositing Visual Effects Essentials for the Aspiring Artist
Steve Wright, 2008
Compositing Visual Effects: Essentials for the Aspiring Artist
Steve Wright, 2007
Copy, Rip, Burn: The Politics of Copyleft and Open Source
David Berry, 2008
