کتاب های Steven Hill

Emergence: The Connected Lives of Ants, Brains, Cities, and Software
Steven Johnson, 2002
E-Business and ERP: Transforming the Enterprise
Steven J. Luck, 2005
Enterprise Architecture at Work: Modelling, Communication and Analysis
Wim Van Grembergen, Steven De Haes, 2005
Enterprise governance of information technology: achieving strategic alignment and value
Steven De Haes, Wim Van Grembergen (auth.), 2009
Enterprise Governance of Information Technology: Achieving Strategic Alignment and Value
Steven De Haes, Wim Van Grembergen (auth.), 2009
Access Database Design & Programming
Steven Roman, 2002![Access database design & programming: [what you really need to know to develop with access]](http://cdn.ketabkoo.com/covers/0/73728-n.jpg)
Access database design & programming: [what you really need to know to develop with access]
Steven Roman PhD, 1999
Access database design and programming
Steven Roman, 2002
Access database design and programming
Steven Roman, 2002
WIN32 API Programming with Visual Basic
Steven Roman, 1999
ADO.NET Programming in Visual Basic .NET
Steven Holzner, Bob Howell, 2003
ADO.NET Programming in Visual Basic .NET
Steven Holzner, Bob Howell, 2003
Firewalls and Internet Security: Repelling the Wily Hacker
William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin, 2003
Firewalls and Internet Security: Repelling the Wily Hacker
William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin, 2003
Hackers: Heroes of the Computer Revolutio
Steven Levy, 1985
Hackers: Heroes of the computer revolution
Steven Levy, 1985
Hackers: Heroes of the computer revolution
Steven Levy, 2010
Back to Basics: Your Guide to Manufacturing Excellence
R . T . Chris Christensen; Steven A . Melnyk, 2000
Back to Basics: Your Guide to Manufacturing Excellence
R . T . Chris Christensen; Steven A . Melnyk, 2000
Building Choral Excellence: Teaching Sight-Singing in the Choral Rehearsal
Steven M. Demorest, 2001
Applied MAPLE for engineers and scientists
Steven Adams, Christopher S. Tocci, 1996
Applied Numerical Methods with MATLAB for Engineers and Scientists
Steven Chapra, 2006
Applied Numerical Methods With MATLAB: for Engineers & Scientists, 3rd Edition
Steven Chapra, 2011