نتایج جستجو

A Practical Guide to Testing Object-Oriented Software
John D. McGregor, David A. Sykes, 2001
Ada 95.The craft of object-oriented programming
John English, 1996
Ada 95: The Craft of Object-Oriented Programming
John English, 1996
OpenGL Shading Language
Randi J. Rost, Bill Licea-Kane, Dan Ginsburg, John M. Kessenich, Barthold Lichtenbelt, Hugh Malan, Mike Weiblen, 2009
UDK iOS game development beginner's guide
John P. Doran, Christos Gatzidis, 2012
Introduction to Automata Theory, Languages, and Computations
John E. Hopcroft, Rajeev Motwani, Jeffrey D. Ullman, 2006
English grammar and composition. complete course
John E. Warriner, 1969
The anatomy of a compiler
John A.N. Lee, 1974
The Anatomy of a Compiler
John A.N. Lee, 1974
Writing Interactive Compilers and Interpreters
Peter John Brown, 1979
A House on Fire: The Rise and Fall of Philadelphia Soul
John A. Jackson, 2004
ActiveX Programming with Visual C++
Jerry Anderson, John Berg, Michael Regelski, Allen Clark, 1997
Adding ajax
John Sharp, 2007![ADO.NET Data Services] : Working with RESTful Data](http://cdn.ketabkoo.com/covers/0/74747-n.jpg)
ADO.NET Data Services] : Working with RESTful Data
John Shaw; Simon Evans, 2008
Beautiful security
Andy Oram, John Viega, 2009
Beautiful security
Andy Oram, John Viega, 2009
Beautiful Security: Leading Security Experts Explain How They Think
Andy Oram, John Viega, 2009
Beautiful Security: Leading Security Experts Explain How They Think
Andy Oram, John Viega, 2009
Biometrics
John D. Woodward Jr., Nicholas M. Orlans, Peter T. Higgins, 2003
Black hat: misfits, criminals, and scammers in the Internet age
John Biggs, 2004
English Grammar Simplified
Blanche Ellsworth, John A. Higgins, 1997
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit
John Chirillo, 2001
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit
John Chirillo, 2001