انتشارات Addison Wesley Professional

Large-Scale C++ Volume I: Process and Architecture
John Lakos [John Lakos], 2019
Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference
Cameron Davidson-Pilon, 2015
Information Privacy Engineering and Privacy by Design: Understanding privacy threats, technologies, and regulations
William Stallings, 6 Dec 2019
Programming Pearls
Jon Bentley, 1999
Introduction to Programming in Python: An Interdisciplinary Approach
Robert Sedgewick; Kevin Wayne; Robert Dondero, 2015
BPF Performance Tools
Brendan Gregg, 2019
UNIX Network Programming, Volume 1: The Sockets Networking API, 3rd Edition
W. Richard Stevens, Bill Fenner, Andrew M. Rudoff, 2003
Constructing the User Interface with Statecharts
Ian Horrocks, 1999
3D User Interfaces: Theory and Practice
Joseph J. LaViola Jr. et al., 2017
The Java Class Libraries. Volume 2
Chan Patrick, Lee Rosanna, 1998
Network Programmability with YANG: The Structure of Network Automation with YANG, NETCONF, RESTCONF, and gNMI
Benoit Claise, Joe Clarke, Jan Lindblad, 2019
Managing the Unmanageable: Rules, Tools, and Insights for Managing Software People and Teams
Mickey W. Mantle; Ron Lichty, 2019
How to Use Objects: Code and Concepts
Holger Gast, 2016
Agile Leadership Toolkit: Learning to Thrive with Self-Managing Teams
Peter Koning, 2019
Spring Into Technical Writing for Engineers and Scientists: For Engineers and Scientists
Barry J. Rosenberg, 2005
Cocoa Design Patterns
Erik M. Buck; Donald A. Yacktman, 2009
The Art of Computer Virus Research and Defense
Peter Szor, 2005
Building Secure Software: How to Avoid Security Problems the Right Way
John Viega; Gary McGraw, 2001
Java Design Patterns A Tutorial
James W. Cooper, 2000
Effective Python: 90 Specific Ways to Write Better Python
Brett Slatkin, 2019
Effective Python: 90 Specific Ways to Write Better Python
Brett Slatkin, 2019