Name | Identifiers | Coverage |
---|---|---|
Tcl/Tk (Second Edition) |
|
Fulltext |
Network Algorithmics |
|
Fulltext |
Introduction to Data Compression (Third Edition) |
|
Fulltext |
Unit Testing in Java |
|
Fulltext |
Value Creation from E-Business Models |
|
Fulltext |
Object-Oriented Design with UML and Java |
|
Fulltext |
Writing Security Tools and Exploits |
|
Fulltext |
Networks on Chips |
|
Fulltext |
Object-Oriented Reengineering Patterns |
|
Fulltext |
Persuasive Technology |
|
Fulltext |