نتایج جستجو

Refactoring - Improving the Design of Existing Code
Martin Fowler, Kent Beck, John Brant, William Opdyke, Don Roberts, 1999
Refactoring: Improving the Design of Existing Code
Martin Fowler, Kent Beck, John Brant, William Opdyke, Don Roberts, 1999
Refactoring: Improving the Design of Existing Code
Martin Fowler, Kent Beck, John Brant, William Opdyke, Don Roberts, 1999
Refactoring: Improving the Design of Existing Code
Martin Fowler, Kent Beck, John Brant, William Opdyke, Don Roberts, 1999
Refactoring: Improving the Design of Existing Code
Martin Fowler, Kent Beck, John Brant, William Opdyke, Don Roberts, 1999
2 Corinthians: Power in Weakness (Preaching the Word)
R. Kent Hughes, 2006
Recognition in Microbe-Plant Symbiotic and Pathogenic Interactions
Sharon R. Long, N. Kent Peters, John T. Mulligan, Mark E. Dudley, Robert F. Fisher (auth.), Ben Lugtenberg (eds.), 1986
Avoiding School Facility Issues: A Consultant's Guidance to School Superintendents
G., Kent Stewart, 2006
Chez Scheme 7 user's guide.
R. Kent Dybvig, 2007
A Field Guide to Mushrooms: North America (Peterson Field Guide)
Kent H. McKnight, Vera B. McKnight, 1998
American Indian Tribes (2 Volume Set)
R. Kent Rasmussen, The Editors of Salem Press, 2000
Burial Rites: A Novel
Hannah Kent, 2013
Cushing of Gettysburg: The Story of a Union Artillery Commander
Kent Masterson Brown, 1998
Philosophy of Ecology
Bryson Brown, Kevin de Laplante, Kent Peacock, Dov M. Gabbay, Paul Thagard, John Woods, 2011
Philosophy of Ecology
Bryson Brown, Kevin de Laplante, Kent Peacock, Dov M. Gabbay, Paul Thagard, John Woods, 2011
Retreat from Gettysburg: Lee, Logistics, and the Pennsylvania Campaign (Civil War America)
Kent Masterson Brown, 2005
The Superhero Reader
Charles Hatfield, Charles Hatfield, Jeet Heer, Kent Worcester, Will Brooker, Jeffrey Brown, Scott Bukatman, John G. Cawelti, Peter Coogan, Jules Feiffer, Henry Jenkins, Robert Jewett, John Shelton Lawrence, Gerard Jones, Geoff Klock, Karin Kukkonen, Andy Medhurst, Adilifu Nama, Walter Ong, Lorrie Palmer, Richard Reynolds, Trina Robbins, Lillian Robinson, Roger B. Rollin, Gloria Steinem, Jennifer Stuller, Fredric Wertham, Philip Wylie, 2013
Valency
M. F. O’Dwyer, J. E. Kent, R. D. Brown (auth.), 1978
An Education in Facebook?: Higher Education and the World’s Largest Social Network
Mike Kent, Tama Leaver, 2014
Hands-On Ethical Hacking and Network Defense
Michael T. Simpson, Kent Backman, James E. Corley, 2012
Hands-On Ethical Hacking and Network Defense
Backman, Kent; Corley, James E.; Simpson, Michael T, 2013
Cisco Security Architectures
Gilbert Held, Kent Hundley, 1999