Раздел: зарубежная компьютерная литература

InDesign CS4 Bible. Galen Gruman

InDesign CS4 Bible

Schneier on Security. Брюс Шнайер

Schneier on Security

SmartDraw For Dummies. Doug  Lowe

SmartDraw For Dummies

Zoho For Dummies. Steve  Holzner

Zoho For Dummies

Network Security Bible. Eric  Cole

Network Security Bible

Windows 7 Bible. Jim  Boyce

Windows 7 Bible

SAS For Dummies. Stephen  McDaniel

SAS For Dummies

Quick CORBA 3. Jon  Siegel

Quick CORBA 3

Firefox For Dummies. Blake  Ross

Firefox For Dummies

Mastering Apache Velocity. Jim  Cole

Mastering Apache Velocity

MindManager For Dummies. Hugh  Cameron

MindManager For Dummies

AOL For Dummies. John  Kaufeld

AOL For Dummies

UNIX For Dummies. John Levine R.

UNIX For Dummies

Home Networking Bible. Sue  Plumley

Home Networking Bible

iPAQ For Dummies. Brian  Underdahl

iPAQ For Dummies

C For Dummies. Dan Gookin

C For Dummies

C++ For Dummies. Stephen Davis R.

C++ For Dummies

GarageBand For Dummies. Bob LeVitus

GarageBand For Dummies

Content Management Bible. Bob  Boiko

Content Management Bible

Eclipse For Dummies. Barry Burd A.

Eclipse For Dummies

Professional Assembly Language. Richard Blum

Professional Assembly Language

XML For Dummies. Ed  Tittel

XML For Dummies

TCP/IP Foundations. Andrew Blank G.

TCP/IP Foundations

C# Network Programming. Richard Blum

C# Network Programming

Mastering Delphi 6. Marco  Cant?

Mastering Delphi 6

MacBook For Dummies. Mark Chambers L.

MacBook For Dummies

Beginning Algorithms. Simon  Harris

Beginning Algorithms

Beginning Algorithms. Simon  Harris

Beginning Algorithms

Beginning SQL. Paul  Wilton

Beginning SQL

Java Foundations. Todd  Greanier

Java Foundations

BSD UNIX Toolbox. 1000+ Commands for FreeBSD, OpenBSD and NetBSD. Christopher Negus

BSD UNIX Toolbox. 1000+ Commands for FreeBSD, OpenBSD and NetBSD

Hack Attacks Revealed. A Complete Reference with Custom Security Hacking Toolkit. John  Chirillo

Hack Attacks Revealed. A Complete Reference with Custom Security Hacking Toolkit

Building B2B Applications with XML. A Resource Guide. Michael  Fitzgerald

Building B2B Applications with XML. A Resource Guide

Managing Open Source Projects. A Wiley Tech Brief. Jan  Sandred

Managing Open Source Projects. A Wiley Tech Brief

Technology Scorecards. Aligning IT Investments with Business Performance. Sam  Bansal

Technology Scorecards. Aligning IT Investments with Business Performance

Service Providers. ASPs, ISPs, MSPs, and WSPs. Mary Gillespie Helen

Service Providers. ASPs, ISPs, MSPs, and WSPs

Linux Security. Craig Hunt Linux Library. Ram?n Honta??n J.

Linux Security. Craig Hunt Linux Library

Effective GUI Testing Automation. Developing an Automated GUI Testing Tool. Kanglin  Li

Effective GUI Testing Automation. Developing an Automated GUI Testing Tool

UNIX Filesystems. Evolution, Design, and Implementation. Steve Pate D.

UNIX Filesystems. Evolution, Design, and Implementation

Malicious Cryptography. Exposing Cryptovirology. Adam  Young

Malicious Cryptography. Exposing Cryptovirology

Hack Attacks Testing. How to Conduct Your Own Security Audit. John  Chirillo

Hack Attacks Testing. How to Conduct Your Own Security Audit

Web 2.0 Heroes. Interviews with 20 Web 2.0 Influencers. Bradley Jones L.

Web 2.0 Heroes. Interviews with 20 Web 2.0 Influencers

Network Services Investment Guide. Maximizing ROI in Uncertain Times. Mark  Gaynor

Network Services Investment Guide. Maximizing ROI in Uncertain Times

Architecting Enterprise Solutions. Patterns for High-Capability Internet-based Systems. Paul  Dyson

Architecting Enterprise Solutions. Patterns for High-Capability Internet-based Systems

Java Enterprise Design Patterns. Patterns in Java. Mark  Grand

Java Enterprise Design Patterns. Patterns in Java

Unauthorised Access. Physical Penetration Testing For IT Security Teams. Wil  Allsopp

Unauthorised Access. Physical Penetration Testing For IT Security Teams

AutoCAD. Secrets Every User Should Know. Dan  Abbott

AutoCAD. Secrets Every User Should Know

Reversing. Secrets of Reverse Engineering. Eldad  Eilam

Reversing. Secrets of Reverse Engineering

Network Security Foundations. Technology Fundamentals for IT Success. Matthew  Strebe

Network Security Foundations. Technology Fundamentals for IT Success

The Mac OS X Command Line. Unix Under the Hood. Kirk  McElhearn

The Mac OS X Command Line. Unix Under the Hood

  • 1
  • ...
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • ...
  • 49