نتایج جستجو
Web Application Design Handbook: Best Practices for Web-Based Software
Susan Fowler, Victor Stanwick, 2004
Web application design handbook: best practices for web-based software
Susan Fowler, Victor Stanwick, 2004
Web Application Design Handbook: Best Practices for Web-Based Software (Interactive Technologies)
Susan Fowler, Victor Stanwick, 2004
Web Application Design Handbook: Best Practices for Web-Based Software (Interactive Technologies)
Susan Fowler, Victor Stanwick, 2004
Web Application Design Handbook: Best Practices for Web-Based Software (Interactive Technologies)
Susan Fowler, Victor Stanwick, 2004
Web Application Design Handbook= Best Practices for Web Based Software
Susan Fowler, Victor Stanwick, 2004
Rapid Development: Taming Wild Software Schedules
Steve McConnell, 1996
Rapid Development: Taming Wild Software Schedules
Steve McConnell, 1996
Open Source Enterprise Software: Grundlagen, Praxistauglichkeit und Marktübersicht quelloffener ERP-Systeme
Alexandra Kees (auth.), 2015
Black Hat Physical Device Security: Exploiting Hardware and Software
Drew Miller, Rob Shein, Michael Bednarczyk, Black Hat Services, 2005
CMMI for Development®: Guidelines for Process Integration and Product Improvement (3rd Edition) (SEI Series in Software Engineering)
Mary Beth Chrissis, Mike Konrad, Sandra Shrum, 2011
CMMI for Development®: Guidelines for Process Integration and Product Improvement (3rd Edition) (SEI Series in Software Engineering)
Mary Beth Chrissis, Mike Konrad, Sandra Shrum, 2011
CMMI for Development®: Guidelines for Process Integration and Product Improvement (3rd Edition) (SEI Series in Software Engineering)
Mary Beth Chrissis, Mike Konrad, Sandra Shrum, 2011
Engineering Analysis with ANSYS Software
Tadeusz Stolarski, Y. Nakasone, S. Yoshimoto, 2006
Engineering Analysis with ANSYS Software
Tadeusz Stolarski, Y. Nakasone, S. Yoshimoto,, 2007
Black Hat physical device security: exploiting hardware and software
Drew Miller, 2005
Black Hat Physical Device Security: Exploiting Hardware and Software
Drew Miller, 2005
Black Hat Physical Device Security: Exploiting Hardware and Software
Drew Miller, 2005
The Art of Software Innovation: Eight Practice Areas to Inspire your Business
Wim Codenie, Minna Pikkarainen, Nick Boucart (auth.), Minna Pikkarainen, Wim Codenie, Nick Boucart, José Antonio Heredia Alvaro (eds.), 2011
Software Failure Risk: Measurement and Management
Susan A. Sherer (auth.), 1992
Algebraic Methodology and Software Technology: 13th International Conference, AMAST 2010, Lac-Beauport, QC, Canada, June 23-25, 2010. Revised Selected Papers
Jie Ding, Jane Hillston (auth.), Michael Johnson, Dusko Pavlovic (eds.), 2011
Algebraic Methodology and Software Technology: 13th International Conference, AMAST 2010, Lac-Beauport, QC, Canada, June 23-25, 2010. Revised Selected Papers
Jie Ding, Jane Hillston (auth.), Michael Johnson, Dusko Pavlovic (eds.), 2011
Computer Software & Intellectual Property: Background Paper
Congress of the United States Office of Technology Assessment (auth.), 1990
