کتاب های R. D. Davis

Building Web Services with Java: Making Sense of XML, SOAP, WSDL and UDDI
Steve Graham, Simeon Simeonov, Toufic Boubez, Glen Daniels, Doug Davis, Yuichi Nakamura, Ryo Neyama, 2001
Building Web Services with Java: Making Sense of XML, SOAP, WSDL and UDDI
Steve Graham, Simeon Simeonov, Toufic Boubez, Glen Daniels, Doug Davis, Yuichi Nakamura, Ryo Neyama, 2001
Building Web Services with Java: Making Sense of XML, SOAP, WSDL and UDDI
Steve Graham, Simeon Simeonov, Toufic Boubez, Glen Daniels, Doug Davis, Yuichi Nakamura, Ryo Neyama, 2001
Building Web Services with Java: Making Sense of XML, SOAP, WSDL, and UDDI
Steve Graham, Doug Davis, Simeon Simeonov, Glen Daniels, Peter Brittenham, Yuichi Nakamura, Paul Fremantle, Dieter Koenig, Claudia Zentner, 2004
Building Web Services with Java: Making Sense of XML, SOAP, WSDL, and UDDI (2nd Edition)
Steve Graham, Doug Davis, Simeon Simeonov, Glen Daniels, Peter Brittenham, Yuichi Nakamura, Paul Fremantle, Dieter Koenig, Claudia Zentner, 2004
Cognative Therapy of Personality Disorders
Aaron T. Beck MD, EdD Arthur Freeman EdD, Denise D. Davis Phd, 2003
Cognitive Therapy of Personality Disorders, Third Edition
Aaron T. Beck MD, Denise D. Davis PhD, EdD Arthur Freeman EdD, 2014
Drying, Roasting, and Calcining of Minerals
Battle, Thomas P.; Davis, Boyd R.; Downey, Jerome P.; May, Lawrence D.; Neelameggham, Neale R.; Pistorius, P. Chris; Sanchez-Segado, Sergio; TMS, 2015
Categorical Data Analysis Using SAS, Third Edition
Maura E. Stokes, Charles S. Davis, Gary G. Koch, 2012
Categorical data analysis using the SAS system
Maura Ellen Stokes; Charles S Davis; Gary G Koch, 2000
B-29 Superfortress in action
Larry Davis, Joe Sewell, Don Greer, 1987
Boeing P-26 Peashooter - Mini in action No. 2
Larry Davis, Joe Sewell, Don Greer, Tom Tullis, 1994
C-47 Skytran in Action
Larry Davis, Joe Sewell, Don Greer, Tom Tullis, 1995
Pocket Guide to Teaching for Clinical Instructors
Bullock, Ian; Davis, Mike; Lockey, Andrew; Mackway-Jones, Kevin, 2016
Becoming Vegetarian: The Complete Guide to Adopting a Healthy Vegetarian Diet
Vesanto Melina, Brenda Davis, 2003
Becoming Vegetarian: The Complete Guide to Adopting a Healthy Vegetarian Diet
Vesanto Melina, Brenda Davis, 2003
Becoming Vegetarian: The Complete Guide to Adopting a Healthy Vegetarian Diet
Vesanto Melina, Brenda Davis, 2003
Hacking exposed computer forensics : secrets & solutions
Aaron Philipp; David Cowen; Chris Davis, CISSP, 2010
Hacking Exposed Computer Forensics, 2nd Edition: Computer Forensics Secrets and Solutions
Aaron Philipp, David Cowen, Chris Davis, 2009
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
Aaron Philipp, David Cowen, Chris Davis, 2009
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
Aaron Philipp, David Cowen, Chris Davis, 2009
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
Aaron Philipp, David Cowen, Chris Davis, 2009
Hacking Exposed Computer Forensics: Computer Forensics Secrets & Solutions
Aaron Philipp, David Cowen, Chris Davis, 2009