نتایج جستجو
Advanced Network Programming – Principles and Techniques: Network Application Programming with Java
Bogdan Ciubotaru, Gabriel-Miro Muntean (auth.), 2013
Advanced Prolog: Techniques and Examples
Peter Ross, 1989
Insulated Gate Bipolar Transistor IGBT Theory and Design
Frank Mittelbach, Michel Goossens, Johannes Braams, David Carlisle, Chris Rowley, 2003
LaTeX maths and graphics
Love T., 2004
Math into LaTeX: an introduction to LaTeX and AMS-LaTex
George Grätzer, 1996
Math into LaTeX: an introduction to LaTeX and AMS-LaTex
George Grätzer, 1996
Math into LATEX: An Introduction to LATEX and AMS-LATEX
George Grätzer, 1995
Math into LaTeX: an introduction to LaTeX and AMS-LaTeX(pages 3-56,345-432)
George Grätzer, 1995
The LaTex graphics companion: illustrating documents with TeX and PostScript
Michel Goossens, Sebastian Rahtz, Frank Mittelbach, 1997
ASP.NET 2.0 MVP Hacks and Tips
David Yack, Joe Mayo, Scott Hanselman, Fredrik Normén, Dan Wahlin, J. Ambrose Little, Jonathan Goodyear, 2006
Astronomy Hacks: Tips and Tools for Observing the Night Sky
Robert Bruce Thompson, Barbara Fritchman Thompson, 2005
Berek and Hacker's Gynecologic Oncology
Jonathan S. Berek, Neville F. Hacker, 2009
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz, 2014
Black hat: misfits, criminals, and scammers in the Internet age
John Biggs, 2004
English Grammar in Use-Reference and Practice for Intermediate Students of..
Raymond Murphy, 1998
English Grammar in Use: Reference and Practice for Intermediate Students of English
Murphy R., Altman R., Rutherford W.E., 1998
Client-Side Attacks and Defense
Oriyano Sean-Philip, Robert Shimonski, 2012
