نتایج جستجو

Expert Oracle Practices: Oracle Database Administration from the
Pete Finnigan, Alex Gorbachev, Randolf Geist, Tim Gorman, Connie Green, Charles Hooper, Jonathan Lewis, Niall Litchfield, Karen Morton, Robyn Sands, Joze Senegacnik, Uri Shaft, Riyaj Shamsudeen, Jeremiah Wilton, Graham Wood, 2010
Expert Oracle Practices: Oracle Database Administration from the Oak Table
Pete Finnigan, Alex Gorbachev, Randolf Geist, Tim Gorman, Connie Green, Charles Hooper, Jonathan Lewis, Niall Litchfield, Karen Morton, Robyn Sands, Joze Senegacnik, Uri Shaft, Riyaj Shamsudeen, Jeremiah Wilton, Graham Wood, 2010
Expert Oracle Practices: Oracle Database Administration from the Oak Table
Melanie Caffrey, Pete Finnigan, Randolf Geist, Alex Gorbachev, Tim Gorman, Connie Green, Charles Hooper, Jonathan Lewis, Niall Litchfield, Karen Morton, Robyn Sands, Jože Senegačnik, Uri Shaft, Riyaj Shamsudeen, Jeremiah Wilton, Graham Wood (auth.), 2010
Oracle Insights: Tales of the Oak Table
Mogens Nørgaard, James Morle, Dave Ensor, Tim Gorman, Kyle Hailey, Anjo Kolk, Jonathan Lewis, Connor McDonald, Cary Millsap, David Ruthven, Gaja Krishna Vaidyanatha (auth.), 2004
Cognition, Vol. 7, No. 4
Jose Morais, Luz Cary, Jesus Alegria, Paul Bertelson, Guy Woodruff, David Premack, J. Langford, V.M. Holmes, L. Jonathan Cohen, Daniel Kahneman, Amos Tversky, Andrew W. Ellis & Anthony F. Jorm, 1979
Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook
Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, 2007
Gray Hat Hacking: The Ethical Hacker's Handbook
Allen Harper, Shon Harris, Jonathan Ness, Gideon Lenkey, Chris Eagle, Terron Williams, 2011
Gray Hat Hacking: The Ethical Hacker’s Handbook
Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, 2007
Hacking and Securing iOS Applications
Jonathan Zdziarski, 2012
Hacking and Securing IOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Jonathan Zdziarski, 2012
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Jonathan Zdziarski, 2012
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Jonathan Zdziarski, 2012
Gray hat hacking : the ethical hacker's handbook
Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Branko Spasojevic, Ryan Linn, Stephen Sims, 2011
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
Shon Harris, Allen Harper, Jonathan Ness, Terron Williams, Gideon Lenkey, 2011
Cisco Frame Relay Solutions Guide
Jonathan Chin, 2004
Intrusion Prevention Fundamentals
Earl Carter, Jonathan Hogue, 2006
Headache
Todd J. Schwedt, Jonathan P. Gladstone, R. Allan Purdy, David W. Dodick, 2010
Headache (Cambridge Pocket Clinicians)
Todd J. Schwedt, Jonathan P. Gladstone, R. Allan Purdy, David W. Dodick, 2010
Headache (Cambridge Pocket Clinicians)
Schwedt Todd J., Gladstone Jonathan P., Purdy R. Allan, Dodick David W., 2010
Deploying Cisco Voice over IP Solutions
Jonathan Davidson, 2010
Deploying Cisco Voice over IP Solutions
Jonathan Davidson, 2001
Voice over IP Fundamentals
Jonathan Davidson, James Peters, Brian Gracely, 2000
Voice over IP Fundamentals
Jonathan Davidson, James Peters, Manoj Bhatia, Satish Kalidindi, Sudipto Mukherjee, 2007