نتایج جستجو
UDK iOS game development beginner's guide
John P. Doran, Christos Gatzidis, 2012
Introduction to Automata Theory, Languages, and Computations
John E. Hopcroft, Rajeev Motwani, Jeffrey D. Ullman, 2006
English grammar and composition. complete course
John E. Warriner, 1969
The anatomy of a compiler
John A.N. Lee, 1974
The Anatomy of a Compiler
John A.N. Lee, 1974
Writing Interactive Compilers and Interpreters
Peter John Brown, 1979
A House on Fire: The Rise and Fall of Philadelphia Soul
John A. Jackson, 2004
ActiveX Programming with Visual C++
Jerry Anderson, John Berg, Michael Regelski, Allen Clark, 1997
Adding ajax
John Sharp, 2007
ADO.NET Data Services] : Working with RESTful Data
John Shaw; Simon Evans, 2008
Beautiful security
Andy Oram, John Viega, 2009
Beautiful security
Andy Oram, John Viega, 2009
Beautiful Security: Leading Security Experts Explain How They Think
Andy Oram, John Viega, 2009
Beautiful Security: Leading Security Experts Explain How They Think
Andy Oram, John Viega, 2009
Biometrics
John D. Woodward Jr., Nicholas M. Orlans, Peter T. Higgins, 2003
Black hat: misfits, criminals, and scammers in the Internet age
John Biggs, 2004
English Grammar Simplified
Blanche Ellsworth, John A. Higgins, 1997
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit
John Chirillo, 2001
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit
John Chirillo, 2001
Hack Attacks Testing: How to Conduct Your Own Security Audit
John Chirillo, 2002
Access controlled: the shaping of power, rights, and rule in cyberspace
Ronald J. Deibert, John G. Palfrey, Rafal Rohozinski, Jonathan Zittrain, Miklos Haraszti, 2010
Achieving Strategic Excellence: An Assessment of Human Resource Organizations
Edward E. Lawler, John W. Boudreau, Susan Albers Mohrman, 2006
Care for the Dying: A Pathway to Excellence
John Ellershaw, Susie Wilkinson, 2003
