نتایج جستجو

Recent Advances in Computational Methods and Clinical Applications for Spine Imaging
Jianhua Yao, Ben Glocker, Tobias Klinder, Shuo Li (eds.), 2015
ASP.NET MVC 2 in Action
Jeffrey Palermo, Ben Scheirman, Jimmy Bogard, Eric Hexter, Matthew Hinze, 2010
ASP.NET MVC 2 in Action
Jeffrey Palermo, Ben Scheirman, Jimmy Bogard, Eric Hexter, Matthew Hinze, 2010
Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings
Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan (auth.), Mark D. Ryan, Ben Smyth, Guilin Wang (eds.), 2012
Ultimate Worst-Case Scenario Survival Handbook
David Borgenicht, Joshua Piven, Ben H. Winters, Brenda Brown, 2012
Hacking Gmail
Ben Hammersley, 2006
Hacking GMail
Ben Hammersley, 2005
Hacking GMail (ExtremeTech)
Ben Hammersley, 2005
Hacking GMail (ExtremeTech)
Ben Hammersley, 2005
Hacking GMail (ExtremeTech)
Ben Hammersley, 2005
The Start Up of You
Reid Hoffman & Ben Casnocha, 2012
18 6 Diplomatic condolences: ideological positioning in the death of Yasser Arafat
Ben Fenton-Smith, 2007
Service-Oriented Computing - ICSOC 2014 Workshops: WESOA; SeMaPS, RMSOC, KASA, ISC, FOR-MOVES, CCSA and Satellite Events, Paris, France, November 3-6, 2014, Revised Selected Papers
Farouk Toumani, Barbara Pernici, Daniela Grigori, Djamal Benslimane, Jan Mendling, Nejib Ben Hadj-Alouane, Brian Blake, Olivier Perrin, Iman Saleh Moustafa, Sami Bhiri (eds.), 2015
Machine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2009, Bled, Slovenia, September 7-11, 2009, Proceedings, Part I
Shai Ben-David (auth.), Wray Buntine, Marko Grobelnik, Dunja Mladenić, John Shawe-Taylor (eds.), 2009
Pro SQL Server 2012 Practices
Bradley Ball, TJay Belt, Glenn Berry, Jes Borland, Carlos Bossy, Louis Davidson, Ben DeBow, Grant Fritchey, Jonathan Gardner, Jesper Johansen, Jeremy Lowell, Wendy Pastrick, Kellyn Pot’vin, Mladen Prajdić, Herve Roggero, Chris Shaw, Gail Shaw, Jason Strate (auth.), 2012
The Definitive Guide To Jython: Python For The Java™ Platform
Josh Juneau, Jim Baker, Victor Ng, Leo Soto, Frank Wierzbicki (auth.), Steve Anglin, Duncan Parkes, Clay Andres, Mark Beckner, Ewan Buckingham, Gary Cornell, Jonathan Gennick, Jonathan Hassell, Michelle Lowman, Matthew Moodie, Duncan Parkes, Jeffrey Pepper, Frank Pohlmann, Douglas Pundick, Ben Renow-Clarke, Dominic Shakeshaft, Matt Wade, Tom Welsh, Mary Tobin, Tracy Brown Collins (eds.), 2010
Modular forms on schiermonnikoog
Bas Edixhoven, Gerard van der Geer, Ben Moonen, 2008
Modular Forms on Schiermonnikoog
Bas Edixhoven, Gerard van der Geer, Ben Moonen, 2008
Number Fields and Function Fields - Two Parallel Worlds
Gerard B. M. Geer, Ben J.J. Moonen, René Schoof, 2005
Number Fields and Function Fields—Two Parallel Worlds
Gebhard Böckle (auth.), Gerard van der Geer, Ben Moonen, René Schoof (eds.), 2005
Finite antenna arrays and FSS
Ben Munk; John Wiley & Sons, 2003
Finite Antenna Arrays and FSS
Ben A. Munk, 2003
Modern Actuarial Theory and Practice, Second Edition
Philip Booth, Robert Chadburn, Steven Haberman, Dewi James, Zaki Khorasanee, Robert H. Plumb, Ben Rickayzen, 2004