Holly Black
Holly Black
Holly Black
Holly Black
Cara Black
Aimée leduc, a parisian private investigator, has always sworn she would stick to tech investigation—no criminal cases for her.
Sara Hanna-Black
Ethan Black
Edwin Black
Johnson, Darryl, 2nd
Johnson, Darryl, 2nd
Johnson, Darryl, 2nd
Johnson, Darryl, 2nd
Jeremy Black
Remi Black
Matthew Steven Black
Jeremy Black
Edwin Black
Johnson, Darryl, 2nd
Daniel Black
Daniel Black
Johnson, Darryl, 2nd
Johnson, Darryl, 2nd
Johnson, Darryl, 2nd
Remi Black
Darryl C. Zeldin
Black Rain Editions
Keda Black
Sadie Black
Victoria Black
Leona Nichole Black
Black Legends Awards - Silicon Valley
Stasia Black
Black Rain Editions
Black Maverick Comics LLC
Sadie Black
Cara Black
Shayla Black
black sheep publications
Stasia Black
Jeremy Black
Black Lab Books
Black Rain Editions
Tamar D. Black
Tamar D. Black
Black Kweens
Darryl Moses
Black Pearl
Kristine Black-Hawkins
Holly Black
Jeremy Black
Stasia Black
Kristine Black-Hawkins
Stasia Black
Omar Black
A. R. T. BLACK
Darryl Webster
Black Rain Éditions
Atkins, John
Mario Hewardt
Julie C. Meloni
Ulrich Drepper
David Solomon
David Geary
Javaserver faces allows developers to write server-side applications without worrying about the complexities of dealing with browsers and web servers.
Phillip Kerman
This is a flash tutorial, revised to teach the latest version of adobe flash cs5 through 24 one-hour lessons.
Valery Abu-Eid
The complete best-practice guide to designing and implementing highly dynamic, robust, and reliable java ebterprise applications with osgi..
Cody Bunch
Joe Conway
Thomas Kraus
Thomas Trevethan
Bill Calkins
Michael Brown
Stephen G. Kochan
Jon William Toigo
David Collier-Brown
Shishir Nagaraja
This book is an introductory text to privacy and traffic analysis, a very important aspect of network security.
Jan Nagel
Iain Donald
Vassil Alexandrov
Novel scalable scientific algorithms are needed to enable key science applications and to exploit the computational power of largescale systems.
B. V. Kumar
Raj Goel
Marcelo Yannuzzi
Inter-domain routing security is a big actor in end-to-end network connectivity.
Michael Humphries
Though digital technology will continue to advance the way art is created, traditional mediums and techniques will remain fundamental to creating art.
Alan Thorn
David Fletcher
In the frequentist framework, a quasi-likelihood approach has long been used as a means of allowing for overdispersion, a common occurrence in many areas of scientific research.
Jack L. Burbank
Jack L. Burbank
Gregory Z. Bedny
Human-computer interaction (hci) is no longer limited to trained software users.
Lee Wylde
Robert Galen
Nigel George
Mastering django is the latest version of mastering django: core-the original, best-selling programmer's reference for django.
M. L. Humphrey
Joseph D. Booth
Yuchu Tian
The aim of this handbook is to summarize the recent rapidly developed real-time computing technologies, from theories to applications.
ASCENT - Center for Technical Knowledge
Michael W. Lucas
Carol Woodbury
Ahmed Hussein
Steven Zimmerman
Andy Vickler
ASCENT - Center for Technical Knowledge
Neil Smyth
raywenderlich Tutorial Team
Willie Anne Candy
raywenderlich Tutorial Team
Stephen Wolfram
Matt Washchuk
Brian Rowe
Robert Seiner
Kevin Ruse
Neil Smyth
Clarence Jones