61. Java by dissection : the essentials of Java programming

by Pohl, Ira | McDowell, Charlie.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.72 POH] (1).
62. Java by dissection : the essentials of Java programming

by Pohl, Ira | McDowell, Charlie.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.72 POH] (1).
63. Operating systems : a modern perspective

by Nutt, Gary J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.43 NUT] (2).
64. Enterprise Java programming with IBM websphere

by Brown, Kyle.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.73 BRO] (3).
65. Data Warehouse Project Management

by Adelman, Sid.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 658.4038 ADE] (2).
66. Macintosh human interface guidelines

by Apple Computer Inc.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Reading: Addison-Wesley, 1992Availability: Items available for loan: [Call number: 005.265 APP] (1).
67. Human-computer interaction

by Rogers, Yvonne | Benyon, David | Preece, Jenny | Sharp, Helen.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Addison-Wesley, 1994Availability: Items available for loan: [Call number: 004.019 PRE] (1).
68. Software inspection

by Graham, Dorothy | Gilb, Tom.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Addison-Wesley, 1993Availability: Items available for loan: [Call number: 005.14 GIL] (1).
69. Windows sockets network programming

by Quinn, Bob | Shute, Dave.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Reading: Addison-Wesley, 1996Availability: Items available for loan: [Call number: 005.71 QUI] (5).
70. Object-oriented design heuristics

by Riel, Arthur J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 1996Availability: Items available for loan: [Call number: 005.1 RIE] (1).
71. Windows telephony programming: A developer's guide to TAPI

by Sells, Chris.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 1998Availability: Items available for loan: [Call number: 005.712 SEL] (1).
72. Mobile IP:design principles and practices

by Perkins, Charles E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Addison-Wesley, 1998Availability: Items available for loan: [Call number: 004.62 PER] (1).
73. Computer systems architecture : networking approach

by Williams, Rob.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 004.22 WIL] (2).
74. Object Modeling and User Interface Design

by Harmelen, Mark van.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.117 HAR] (1).
75. Modeling and analysis of security protocols

by Ryan, Peter | Goldsmith, Michael | Lowe, Gavin | Schneider, Steve.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 RYA] (1).
76. Database Solution

by Connolly, Thomas M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.74 CON] (2).
77. Inside Internet security : what hackers don't want you to know

by Crume, Jeff.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 CRU] (1).
78. ARM system-on-chip architecture

by Furber, Steve.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 004.165 STE] (1).
79. Real-time design patterns : robust scalable architecture for real-time systems

by Douglass, Bruce Powel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2003Availability: Items available for loan: [Call number: 004.33 DOU] (2).
80. ACE Programmer's Guide : practical design patterns for netwrok and systems programming

by Huston, Stephen D | Johnson, James CE | Syyid, Umar.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2003Availability: Items available for loan: [Call number: 005.117 HUS] (2).

Powered by Koha