انتشارات Gk Hall

Theory of Computation: Formal Languages, Automata, and Complexity
J. Glenn Brookshear, 1989
Artificial Intelligence Through Prolog
Neil C. Rowe, 1988
Artificial Intelligence Through Prolog
Neil C. Rowe, 1988
Artificial Intelligence Through Prolog
Neil C. Rowe, 1988
Artificial Intelligence with Uncertainty
Deyi Li, Yi Du, 2007
Bayesian Artificial Intelligence
Kevin B. Korb, Ann E. Nicholson, 2004
An introduction to cryptography
Richard A. Mollin, 2007
An Introduction to Cryptography
Richard A. Mollin, 2007
Classical and Contemporary Cryptology
Richard J. Spillman, 2004
Elliptic curves: number theory and cryptography
Lawrence C. Washington, 2008
Elliptic Curves: Number Theory and Cryptography
Lawrence C. Washington, 2008
Making, breaking codes: an introduction to cryptography
Paul Garrett, 2001
Making, breaking codes: an introduction to cryptography
Paul Garrett, 2001
Modern cryptography: theory and practice
Wenbo Mao, 2003
Modern Cryptography: Theory and Practice
Wenbo Mao, 2003
Modern Cryptography: Theory and Practice
Wenbo Mao, 2003
Database Processing: Fundamentals, Design, and Implementation
David M. Kroenke, David J. Auer, 2013
Database Systems: The Complete Book
Hector Garcia-Molina, Jeffrey D. Ullman, Jennifer Widom, 2008
Introduction to Information Systems
Patricia Wallace, 2014
Designing Enterprise Solutions with Sun Cluster 3.0
Richard Elling, Tim Read, 2001
Developing Enterprise Web Services: An Architect's Guide
Sandeep Chatterjee, James Webber, 2003
Enterprise AJAX: Strategies for Building High Performance Web Applications
David C. Johnson, Alexei White, Andre Charland, 2007
Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions
Gregor Hohpe, Bobby Woolf, 1999