کتاب های Andrew S. Blum

Windows Phone 7 development internals: Covers Windows Phone 7 and Windows Phone 7.5
Andrew Whitechapel, 2012
Windows Phone 7 Development Internals: Covers Windows Phone 7 and Windows Phone 7.5
Andrew Whitechapel, 2012
Windows Phone 8 Development Internals
Andrew Whitechapel, Sean McKenna, 2012
Fatigue Damage: Mechanical Vibration and Shock Analysis, Volume 4, Second Edition
John P Wolf, Andrew J. Deeks, 2009
Hacking exposed Cisco networks: Cisco security secrets & solutions
Andrew Vladimirov, Konstantin Gavrilenko, Andrei Mikhailovsky, 2006
A History of Inverse Probability: From Thomas Bayes to Karl Pearson
Andrew I. Dale (auth.), 1991
Hacking the Xbox An Introduction to Reverse Engineering
Andrew Huang, 2013
Hacking the Xbox: An Introduction to Reverse Engineering
Andrew Huang, 2003
Cisco Certification - Bridges, Routers and Switches for CCIEs
Andrew Bruce Caslow, 1999
Cisco Router Configuration Handbook
David Hucaby, Steve McQuerry, Andrew Whitaker, 2010
Cisco Router Configuration Handbook
Dave Hucaby.; Steve McQuerry.; Andrew Whitaker, 2010
Cisco Router Configuration Handbook, 2nd Edition
David Hucaby, Steve McQuerry, Andrew Whitaker, 2010
Cisco Secure Internet Security Solutions
Andrew Mason; Mark J. Newcomb, 2001
Cisco Secure Internet Security Solutions
Andrew Mason, Mark J. Newcomb, 2001
Cisco secure virtual private networks (CSVPN) : CCSP self-study
Andrew G Mason, 2004
Cisco wireless LAN security
Krishna Sankar, Sri Sundaralingam, Darrin Miller, Andrew Balinsky, 2004
Penetration Testing and Network Defense
Andrew Whitaker, Daniel Newman, 2005