کتاب های William Hohl

Promoting Enterprise-led Innovation in China (Directions in Development) (Directions in Development, Countries and Regions)
Chunlin Zhang, Douglas Zhihua Zeng, William Peter Mako, James Seward, 2009
Structuring an Energy Technology Revolution
Charles Weiss, William B. Bonvillian, 2009
Enterprise Mac Security: Mac OS X Snow Leopard
Charles Edge, William Barker, Beau Hunter, Gene Sullivan, 2010
Global Electrification: Multinational Enterprise and International Finance in the History of Light and Power, 1878-2007 (Cambridge Studies in the Emergence of Global Enterprise)
William J. Hausman, Peter Hertner, Mira Wilkins, 2008
B04 STRESS ANALYSIS OF PIPING SYSTEMS
C. Basavaraju P.E., William Saifung Sun P.E.
Broadband Wireless Mobile: 3G and Beyond
Willie W. Lu, William Lu, 2002
Architecting Web Services
William L. Oellermann Jr., 2001
An Introduction to R: Notes on R: A Programming Environment for Data Analysis and Graphics
William N. Venables, David M. Smith, R Development Core Team, 2004
A Field Guide to Genetic Programming
Riccardo Poli, William B. Langdon, Nicholas Freitag McPhee, 2008
Compiler construction
William M. Waite, Gerhard Goos, 1983
Compiler Construction
William M. Waite, Gerhard Goos, 1984
Compiler Construction
William M. Waite, Gerhard Goos (auth.), 1984
A Fast Track To Structured Finance Modeling, Monitoring and Valuation: Jump Start VBA
William Preinitz, 2009
ADO.NET and ADO Examples and Best Practices for VB Programmers
William R. Vaughn (auth.), 2002
ADO.NET Examples and Best Practices for C# Programmers
William R. Vaughn, Peter Blackburn (auth.), 2002
Cryptography and Network Security: Principles and Practice
William Stallings, 2014
Firewalls and Internet Security: Repelling the Wily Hacker
William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin, 2003
Firewalls and Internet Security: Repelling the Wily Hacker
William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin, 2003
Hack Proofing Sun Solaris 8
Ed Mitchell, Ido Dubrawsky, Wyman Miles, F. William Lynch, Syngress, 2001
Hack Proofing Sun Solaris 8
Ed Mitchell, Ido Dubrawsky, Wyman Miles, F. William Lynch, Syngress, 2001
Hack Proofing Your Network
Ed Mitchell, Ido Dubrawsky, Wyman Miles, F. William Lynch, Syngress, 2001
Hack proofing your network
Ed Mitchell, Ido Dubrawsky, Wyman Miles, F. William Lynch, Syngress, 2002
An Outlook On Our Inner Western Way
William G. Gray, 1980
Code Division Multiple Access (CDMA)
Mike Buehrer, William Tranter, 2006