کتاب های John Grin

Writing Interactive Compilers and Interpreters
Peter John Brown, 1979
A House on Fire: The Rise and Fall of Philadelphia Soul
John A. Jackson, 2004
ActiveX Programming with Visual C++
Jerry Anderson, John Berg, Michael Regelski, Allen Clark, 1997
Adding ajax
John Sharp, 2007![ADO.NET Data Services] : Working with RESTful Data](http://cdn.ketabkoo.com/covers/0/74747-n.jpg)
ADO.NET Data Services] : Working with RESTful Data
John Shaw; Simon Evans, 2008
Beautiful security
Andy Oram, John Viega, 2009
Beautiful security
Andy Oram, John Viega, 2009
Beautiful Security: Leading Security Experts Explain How They Think
Andy Oram, John Viega, 2009
Beautiful Security: Leading Security Experts Explain How They Think
Andy Oram, John Viega, 2009
Biometrics
John D. Woodward Jr., Nicholas M. Orlans, Peter T. Higgins, 2003
Black hat: misfits, criminals, and scammers in the Internet age
John Biggs, 2004
English Grammar Simplified
Blanche Ellsworth, John A. Higgins, 1997
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit
John Chirillo, 2001
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit
John Chirillo, 2001
Hack Attacks Testing: How to Conduct Your Own Security Audit
John Chirillo, 2002
Access controlled: the shaping of power, rights, and rule in cyberspace
Ronald J. Deibert, John G. Palfrey, Rafal Rohozinski, Jonathan Zittrain, Miklos Haraszti, 2010
Achieving Strategic Excellence: An Assessment of Human Resource Organizations
Edward E. Lawler, John W. Boudreau, Susan Albers Mohrman, 2006
Care for the Dying: A Pathway to Excellence
John Ellershaw, Susie Wilkinson, 2003
Coach Wooden's Leadership Game Plan for Success: 12 Lessons for Extraordinary Performance and Personal Excellence
John Wooden, Steve Jamison, 2009
Deadhouse: Life in a Coroner’s Office
John Temple, 2005
Low-Power Design Techniques and CAD Tools for Analog and RF Integrated Circuits
Piet Wambacq, Georges Gielen, John Gerrits, 2001