نتایج جستجو

Animation with Scripting for Adobe Flash Professional CS5 Studio Techniques
Chris Georgenes, Justin Putney, 2010
Animators Unearthed: A Guide to the Best of Contemporary Animation
Chris Robinson, 2010
Active Defense - A Comprehensive Guide to Network Security
Chris Brenton, Cameron Hunt, 2001
Aggressive Network Self-Defense
Chris Hurley, 2004
Aggressive Network Self-defense
Neil R. Wyler, Bruce Potter, Chris Hurley, 2005
Aggressive Network Self-Defense
Neil R. Wyler, Bruce Potter, Chris Hurley, 2005
ASP.NET 3.5 Website Programming: Problem - Design - Solution
Chris Love, 2009
ASP.NET 3.5 website programming: problem, design, solution
Chris Love, 2010
Beginning iPhone and iPad Web Apps: Scripting with HTML5, CSS3, and JavaScript
Chris Apers, Daniel Paterson, 2010
Beginning iPhone and iPad Web Apps: Scripting with HTML5, CSS3, and JavaScript
Chris Apers, Daniel Paterson, 2010
Advanced FileMaker Pro 5.5 Techniques for Developers
Chris Moyer, Bob Bowers,, 2002
OpenGL Game Development
Chris Seddon, 2004
OpenGL Game Development (Wordware Applications Library)
Chris Seddon, 2005
Service- and Component-based Development: Using Select Perspective and UML
Hedley Apperly, Ralph Hofman, Steve Latchem, Barry Maybank, Barry McGibbon, David Piper, Chris Simons, Ralph Hoffman, 2003
UML 2 glasklar: Praxiswissen für die UML-Modellierung
Chris Rupp, Stefan Queins, die SOPHISTen, 2012
Insulated Gate Bipolar Transistor IGBT Theory and Design
Frank Mittelbach, Michel Goossens, Johannes Braams, David Carlisle, Chris Rowley, 2003
The LaTeX Companion
Frank Mittelbach, Michel Goossens, Johannes Braams, David Carlisle, Chris Rowley, 2004
The LaTeX companion
Frank Mittelbach, Michel Goossens, Johannes Braams, David Carlisle, Chris Rowley, 2004
The LaTeX companion: front matter, TOC, preface only
Frank Mittelbach, Michel Goossens, Johannes Braams, David Carlisle, Chris Rowley, 2004
Gray Hat Hacking
Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, 2007
Gray Hat Hacking
Eagle, Chris
Gray Hat Hacking - The Ethical Hacker's Handbook
Shon Harris, Allen Harper, Chris Eagle, and Jonathan Ness, 2008
Gray Hat Hacking The Ethical Hacker's Handbook
Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Branko Spasojevic, Ryan Linn, Stephen Sims, 2015