کتاب های William P. Barr

Artificial Intelligence agents and Environments
William JohnTeahan, 2010
Artificial Intelligence: Structures And Strategies For Complex Problem Solving
George F. Luger, William A. Stubblefield, 1997
Artificial Intelligence: Structures and Strategies for Complex Problem Solving
George F. Luger, William A. Stubblefield, 1997
Artificial Intelligence: Structures And Strategies For Complex Problem Solving
George F. Luger, William A. Stubblefield, 1997
Cryptographic Hardware and Embedded Systems – CHES 2005: 7th International Workshop, Edinburgh, UK, August 29 – September 1, 2005. Proceedings
William Dupuy, Sébastien Kunz-Jacques (auth.), Josyula R. Rao, Berk Sunar (eds.), 2005
Promoting Enterprise-led Innovation in China (Directions in Development) (Directions in Development, Countries and Regions)
Chunlin Zhang, Douglas Zhihua Zeng, William Peter Mako, James Seward, 2009
Structuring an Energy Technology Revolution
Charles Weiss, William B. Bonvillian, 2009
Enterprise Mac Security: Mac OS X Snow Leopard
Charles Edge, William Barker, Beau Hunter, Gene Sullivan, 2010
Global Electrification: Multinational Enterprise and International Finance in the History of Light and Power, 1878-2007 (Cambridge Studies in the Emergence of Global Enterprise)
William J. Hausman, Peter Hertner, Mira Wilkins, 2008
B04 STRESS ANALYSIS OF PIPING SYSTEMS
C. Basavaraju P.E., William Saifung Sun P.E.
Broadband Wireless Mobile: 3G and Beyond
Willie W. Lu, William Lu, 2002
Architecting Web Services
William L. Oellermann Jr., 2001
An Introduction to R: Notes on R: A Programming Environment for Data Analysis and Graphics
William N. Venables, David M. Smith, R Development Core Team, 2004
A Field Guide to Genetic Programming
Riccardo Poli, William B. Langdon, Nicholas Freitag McPhee, 2008
Compiler construction
William M. Waite, Gerhard Goos, 1983
Compiler Construction
William M. Waite, Gerhard Goos, 1984
Compiler Construction
William M. Waite, Gerhard Goos (auth.), 1984
A Fast Track To Structured Finance Modeling, Monitoring and Valuation: Jump Start VBA
William Preinitz, 2009
ADO.NET and ADO Examples and Best Practices for VB Programmers
William R. Vaughn (auth.), 2002
ADO.NET Examples and Best Practices for C# Programmers
William R. Vaughn, Peter Blackburn (auth.), 2002
Cryptography and Network Security: Principles and Practice
William Stallings, 2014
Firewalls and Internet Security: Repelling the Wily Hacker
William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin, 2003
Firewalls and Internet Security: Repelling the Wily Hacker
William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin, 2003
Hack Proofing Sun Solaris 8
Ed Mitchell, Ido Dubrawsky, Wyman Miles, F. William Lynch, Syngress, 2001