انتشارات Ism, Addison Wesley Professional

Objective-C Phrasebook
David Chisnall, 2011
HTML5 Guidelines for Web Developers
Klaus Förster, Bernd Öggl, 2011
Java¿ Development on PDAs: Building Applications for Pocket PC and Palm Devices
Daryl Wilding-McBride, 2003
Multithreading Applications in Win32: The Complete Guide to Threads
Jim Beveridge, Robert Wiener, 1996
C Programming FAQs - Frequently Asked Questions
Steve Summit, 1995
C Programming Faqs: Frequently Asked Questions
Steve Summit, 1995
A Tour of C++
Bjarne Stroustrup, 2022
Scala for the Impatient
Cay S. Horstmann, 2012
Software Requirements Essentials: Core Practices for Successful Business Analysis
Karl Wiegers; Candase Hokanson, 2023
Essential GWT: Building for the Web with Google Web Toolkit 2
Federico Kereki, 2010
A Retargetable C Compiler: Design and Implementation
Christopher W. Fraser, David R. Hanson, 1995
Foundations of Deep Reinforcement Learning: Theory and Practice in Python
Laura Graesser; Wah Loon Keng, 2019
The C++ Programming Language, 4th Edition
Bjarne Stroustrup, 2013
Bayesian Analysis with Excel and R
Conrad Carlberg, 2022
The Art of Computer Programming: Volume 4B: Combinatorial Algorithms Part 2
Donald Knuth, 2022
The AWK Programming Language, 2nd Edition (Early Release)
Alfred V. Aho; Brian W. Kernighan; Peter J. Weinberger, 2023
Effective Cybersecurity: A Guide to Using Best Practices and Standards
William Stallings
Security in Computing
Charles Pfleeger, Shari Pfleeger, Lizzie Coles-Kemp, 2023
The design of design: Essays from a computer scientist
Frederick P. Brooks, 2010
Learning Blender
Oliver Villar, 2021
Framework Design Guidelines: Conventions, Idioms, and Patterns for Reusable .NET Libraries
Krzysztof Cwalina, Brad Abrams, 2009