انتشارات Bonn: Addison Wesley
![Datenbankkonzepte in der Praxis. Nach dem Standard SQL-99](http://cdn.ketabkoo.com/covers/0/72035-n.jpg)
Datenbankkonzepte in der Praxis. Nach dem Standard SQL-99
Sönke Cordts, 2002![Ethics for the Information Age](http://cdn.ketabkoo.com/covers/0/72191-n.jpg)
Ethics for the Information Age
Michael J. Quinn, 2014![The Craft of System Security](http://cdn.ketabkoo.com/covers/0/72329-n.jpg)
The Craft of System Security
Sean Smith, John Marchesini, 2007![The Craft of System Security](http://cdn.ketabkoo.com/covers/0/72330-n.jpg)
The Craft of System Security
Sean Smith, John Marchesini, 2007![Designing Enterprise Applications with Java 2 Enterprise Edition](http://cdn.ketabkoo.com/covers/0/72423-n.jpg)
Designing Enterprise Applications with Java 2 Enterprise Edition
Nicholas Kassem, Enterprise Team, Nick Kassem, Enterprise Team, 2000![Designing Enterprise applications with the J2EE platform](http://cdn.ketabkoo.com/covers/0/72425-n.jpg)
Designing Enterprise applications with the J2EE platform
Inderjeet Singh, Beth Stearns, Mark Johnson, Enterprise Team The, 2002![Developing enterprise Java applications with J2EE and UML](http://cdn.ketabkoo.com/covers/0/72432-n.jpg)
Developing enterprise Java applications with J2EE and UML
Khawar Zaman Ahmed, Cary E. Umrysh, 2002![Developing Enterprise Java Applications with J2EE(TM) and UML](http://cdn.ketabkoo.com/covers/0/72433-n.jpg)
Developing Enterprise Java Applications with J2EE(TM) and UML
Khawar Zaman Ahmed, Cary E. Umrysh, 2001![Developing Enterprise Java Applications with J2EE(TM) and UML](http://cdn.ketabkoo.com/covers/0/72434-n.jpg)
Developing Enterprise Java Applications with J2EE(TM) and UML
Khawar Zaman Ahmed, Cary E. Umrysh, 2001![e-Directories: Enterprise Software, Solutions, and Services (With CD-ROM)](http://cdn.ketabkoo.com/covers/0/72443-n.jpg)
e-Directories: Enterprise Software, Solutions, and Services (With CD-ROM)
Daniel House, Tim Hahn, Louis Mauget, Richard Daugherty, Richard Daugherty, 2000![Effective enterprise Java](http://cdn.ketabkoo.com/covers/0/72446-n.jpg)
Effective enterprise Java
Ted Neward, 2005![Effective Enterprise Java](http://cdn.ketabkoo.com/covers/0/72447-n.jpg)
Effective Enterprise Java
Ted Neward, 2005![Enterprise Application Integration](http://cdn.ketabkoo.com/covers/0/72455-n.jpg)
Enterprise Application Integration
David S. Linthicum, 2000![Enterprise Java (TM) Security: Building Secure J2EE (TM) Applications](http://cdn.ketabkoo.com/covers/0/72484-n.jpg)
Enterprise Java (TM) Security: Building Secure J2EE (TM) Applications
Brian Sam-Bodden, Christopher M. Judd, 2004![Enterprise Java Programming with IBM WebSphere](http://cdn.ketabkoo.com/covers/0/72489-n.jpg)
Enterprise Java Programming with IBM WebSphere
Kyle Brown, Gary Craig, Greg Hester, David Pitt, Russell Stinehour, Mark Weitzel, Jim Amsden, Peter M. Jakab, Daniel Berg, 2003![Enterprise Java Security: Building Secure J2EE Applications](http://cdn.ketabkoo.com/covers/0/72490-n.jpg)
Enterprise Java Security: Building Secure J2EE Applications
Marco Pistoia, Nataraj Nagaratnam, Larry Koved, Anthony Nadalin, 2004![Enterprise Java(TM) Security: Building Secure J2EE(TM) Applications](http://cdn.ketabkoo.com/covers/0/72492-n.jpg)
Enterprise Java(TM) Security: Building Secure J2EE(TM) Applications
Marco Pistoia, Nataraj Nagaratnam, Larry Koved, Anthony Nadalin, 2004![Enterprise Patterns and MDA: Building Better Software with Archetype Patterns and UML](http://cdn.ketabkoo.com/covers/0/72519-n.jpg)
Enterprise Patterns and MDA: Building Better Software with Archetype Patterns and UML
Jim Arlow, Ila Neustadt, 2004![Enterprise Security: The Manager's Defense Guide](http://cdn.ketabkoo.com/covers/0/72532-n.jpg)
Enterprise Security: The Manager's Defense Guide
David Leon Clark, 2002![High-Assurance Design: Architecting Secure and Reliable Enterprise Applications](http://cdn.ketabkoo.com/covers/0/72586-n.jpg)