کتاب های Michael G

Advances in Cryptology — ASIACRYPT 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001 Proceedings
Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo (auth.), Colin Boyd (eds.), 2001
Advances in Cryptology — CRYPTO’ 99: 19th Annual International Cryptology Conference Santa Barbara, California, USA, August 15–19, 1999 Proceedings
Jean-Sébastien Coron, David Naccache, Julien P. Stern (auth.), Michael Wiener (eds.), 1999
Advances in Cryptology — EUROCRYPT ’96: International Conference on the Theory and Application of Cryptographic Techniques Saragossa, Spain, May 12–16, 1996 Proceedings
Don Coppersmith, Matthew Franklin, Jacques Patarin, Michael Reiter (auth.), Ueli Maurer (eds.), 1996
Cryptography and Coding: 7th IMA International Conference Cirencester, UK, December 20–22, 1999 Proceedings
Kenneth G. Paterson (auth.), Michael Walker (eds.), 1999
Kryptographie und IT-Sicherheit
Joachim Swoboda, Stephan Spitz, Michael Pramateftakis, 2008
Number Story: From Counting to Cryptography
Peter Michael Higgins, 2008
Number Story: From Counting to Cryptography
Peter Michael Higgins, 2008
Selected Areas in Cryptography: 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers
Shahram Khazaei, Simon Fischer, Willi Meier (auth.), Carlisle Adams, Ali Miri, Michael Wiener (eds.), 2007
Access 2002 bible
Cary N Prague; Michael R Irwin, 2001
Access 2010
Michael Kolberg, 2010
Access 2010 Bible
Michael R. Groh, 2010
Advanced ANSI SQL Data Modeling and Structure Processing
Michael M. David, 1999
Beginners Guide to SQL Server Integration Services Using Visual Studio 2005
Chris Leiter, Dan Wood, Michael Cierkowski, Albert Boettger, 2007
Beginning SQL Server 2000 DBA: From Novice to Professional
Tony Bain, Baya Pavliashvili, Joseph Sack, Michael Benkovich, Brian Freeman (auth.), 2004
Expert PL/SQL Practices: for Oracle Developers and DBAs
John Beresniewicz, Adrian Billington, Martin Büchi, Melanie Caffrey, Ron Crisco, Lewis Cunningham, Dominic Delmolino, Sue Harper, Torben Holm, Connor McDonald, Arup Nanda, Stephan Petit, Michael Rosenblum, Robyn Sands, Riyaj Shamsudeen (auth.), 2011
CISSP (r): Certified Information Systems Security Professional Study Guide, 2nd Edition
Ed Tittle, James Michael Stewart, Mike Chapple, Ed Tittel, 2004
CISSP: Certified Information Systems Security Professional Study Guide
Ed Tittle, James Michael Stewart, Mike Chapple, Ed Tittel, 2004
CISSP: Certified Information Systems Security Professional Study Guide
James Michael Stewart, Ed Tittel, Mike Chapple, 2005
CISSP: Certified Information Systems Security Professional Study Guide
Ed Tittel, Mike Chapple, James Michael Stewart, 2003
CISSP: Certified Information Systems Security Professional study guide
Ed Tittel, Mike Chapple, James Michael Stewart, 2003
CISSP: Certified Information Systems Security Professional study guide
Ed Tittel, Mike Chapple, James Michael Stewart, 2003
CISSP: Certified Information Systems Security Professional study guide
Ed Tittle, James Michael Stewart, Mike Chapple, Ed Tittel, 2004
CISSP: Certified Information Systems Security Professional study guide
Ed Tittle, James Michael Stewart, Mike Chapple, Ed Tittel, 2004
CISSP: Certified Information Systems Security Professional study guide
Ed Tittel, Mike Chapple, James Michael Stewart, 2003