کتاب های Mark Voit

Windows Internals, Part 2
Mark E. Russinovich, David A. Solomon, Alex Ionescu, 2012
Windows Internals, Part 2: Covering Windows Server® 2008 R2 and Windows 7
Mark E. Russinovich, David A. Solomon, Alex Ionescu, 2012
Windows Internals: Including Windows Server 2008 and Windows Vista
Mark Russinovich, David A. Solomon, Alex Ionescu, 2009
Windows Internals: Including Windows Server 2008 and Windows Vista
Mark Russinovich, David A. Solomon, Alex Ionescu, 2009
Windows Internals: Including Windows Server 2008 and Windows Vista, Fifth Edition
Mark E Russinovich; David A Solomon, 2009
Germany and Austria 1814-2000: Modern History for Moden Languages
Mark Allinson, 2002
Implementation and Application of Functional Languages: 19th International Workshop, IFL 2007, Freiburg, Germany, September 27-29, 2007. Revised Selected Papers
Steffen Mazanek, Mark Minas (auth.), Olaf Chitil, Zoltán Horváth, Viktória Zsók (eds.), 2008
Implementation and Application of Functional Languages: 19th International Workshop, IFL 2007, Freiburg, Germany, September 27-29, 2007. Revised Selected Papers
Steffen Mazanek, Mark Minas (auth.), Olaf Chitil, Zoltán Horváth, Viktória Zsók (eds.), 2008
Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings
Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan (auth.), Mark D. Ryan, Ben Smyth, Guilin Wang (eds.), 2012
Building the mobile Internet
Grayson, Mark; Shatzkamer, Kevin; Wierenga, Klaas, 2011
Building the Mobile Internet (Networking Technology)
Mark Grayson, Kevin Shatzkamer, Klaas Wierenga, 2011
Building the Mobile Internet (Networking Technology)
Mark Grayson, Kevin Shatzkamer, Klaas Wierenga, 2011
CCIE voice exam quick reference sheets
Mark Lewis, CCIE, 2007
CCIE voice exam quick reference sheets
Mark Lewis, CCIE, 2007
Contemporary Computer-Assisted Language Learning
Michael Thomas, Hayo Reinders, Mark Warschauer, 2012
Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition
Mark Collier, David Endler, 2013
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
David Endler, Mark Collier, 2006
Hacking Java: The Java Professional's Resource Kit
Mark Wutka David Baker David Boswell Ken Cartwright David Edgar Liebke Tom Lockwood Stephen Matsuba
Hacking the Code: ASP.NET Web Application Security
Mark Burnett, 2004
Hacking the Code: ASP.NET Web Application Security
Mark Burnett, 2004
Hacking the Code: ASP.NET Web Application Security
Mark Burnett, 2004
Hacking the Code: ASP.NET Web Application Security
Mark Burnett, 2004
Practical hacking techniques and countermeasures
Mark D. Spivey, 2006
Practical hacking techniques and countermeasures
Mark D. Spivey, 2006