Your search returned 41 results.

Sort
Results
1.
Image from Google Jackets
Programming in objective-C 2.0 Stephen G. Kochan by
Edition: 2nd ed
Publication details: Upper Saddle River, NJ Addison Wesley Professional c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.133C KOC.

2.
Image from Google Jackets
Bioinformatics in the post-genomic era : genome, transcriptome, proteome, and information-based medicine Jeff Augen by
Edition: 1st ed
Publication details: Boston, MA Addison Wesley Professional 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 572.8028 AUG.

3.
Image from Google Jackets
CMMI Scampi distilled : appraisals for process improvement Dennis M. Ahern ... [et al.] by
Publication details: Upper Saddle River, NJ Addison- Wesley Professional c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.10685 AHE.

4.
Image from Google Jackets
Impossible data warehouse situations : solutions from the experts Sid Adelman... [et al.] by
Publication details: Boston, MA Addison-wesley Professional 2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.4038 ADE.

5.
Image from Google Jackets
Real-time Design Patterns: Robust Scalable Architecture For Real-time Systems Bruce Powel Douglass by Language: English
Publication details: Boston Addison-wesley professional 2002
Availability: Items available for reference: Anna Centenary Library: Not for loan (1)Call number: 004.33 JEN.

6.
Image from Google Jackets
The Build Master: Microsoft's Software Configuration Management Best Practices /Vincent Maraia by Language: English
Publication details: New Delhi Addison-wesley Professional 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.1 MAR.

7.
Image from Google Jackets
Rtp: Audio And Video For The Internet / Colin Perkins by Language: English
Publication details: Addison-wesley Professional 2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.678 PER.

8.
Image from Google Jackets
Object-oriented Analysis And Design With Applications by
Edition: 3 ed.
Language: English
Publication details: Usa Addison-wesley Professional 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.117 BOO.

9.
Image from Google Jackets
Software Assessments, Benchmarks, And Best Practices Jones, Carpers by
Edition: 1 ed.
Language: English
Publication details: Usa Addison-wesley Professional 2000
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.14 JON.

10.
Image from Google Jackets
Start-to-finish Visual Basic 2005 : Learn Visual Basic 2005 As You Design And Develop A Complete Application /Tim Patrick by Language: English
Publication details: Addison Wesley Professional, Upper Saddle River, Nj, ©2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.133 PAT.

11.
Image from Google Jackets
The Executive Guide To Information Security : Threats, Challenges, And Solutions Mark Egan by Language: English
Publication details: India Addison Wesley Professional 2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 EGA.

12.
Image from Google Jackets
Securing Storage Dwivedi, Himanshu by
Publication details: Addison-Wesley Professional 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 DWI.

13.
Image from Google Jackets
SQL for MySQL Developers Lans, Rick F. van der by
Publication details: Addison-Wesley Professional 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.7585 S LAN.

14.
Image from Google Jackets
The Art of Software Security Testing Wysopal, Chris by
Publication details: Addison-Wesley Professional 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005 WYS.

15.
Image from Google Jackets
The CERT C Secure Coding Standard Seacord, Robert C. by
Publication details: Addison-Wesley Professional 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SEA.

16.
Image from Google Jackets
The Art of Computer Virus Research and Defense : by
Publication details: Addison-Wesley Professional, 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.84072 SZO.

17.
Image from Google Jackets
Spring Into HTML and CSS : by
Publication details: Addison-Wesley Professional, 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 006.74 H HOL.

18.
Image from Google Jackets
Refactoring HTML : by
Publication details: Addison-Wesley Professional, 2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 006.74 H HAR.

19.
Image from Google Jackets
XML Data Management : by
Publication details: Addison-Wesley Professional, 2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 006.74X AKM.

20.
Image from Google Jackets
Secure Coding in C and C++ : by
Publication details: Addison-Wesley Professional, 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8C SEA.

21.
Image from Google Jackets
Software Security : by
Publication details: Addison-Wesley Professional, 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 MCG.

22.
Image from Google Jackets
SSL and TLS : by
Publication details: Addison-Wesley Professional, 2001
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 RES.

23.
Image from Google Jackets
Slamming Spam : by
Publication details: Addison-Wesley Professional, 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 HAS.

24.
Image from Google Jackets
Surreptitious Software : by
Publication details: Addison-Wesley Professional, 2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 COL.

25.
Image from Google Jackets
SQL Server 2005 Distilled : by
Publication details: Addison-Wesley Professional, 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.7585 S BRO.

26.
Image from Google Jackets
Step Into Xcode : by
Publication details: Addison-Wesley Professional, 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.432 M AND.

27.
Image from Google Jackets
The Boost Graph Library : by
Publication details: Addison-Wesley Professional, 2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 006.6 SIE.

28.
Image from Google Jackets
Succeeding with Use Cases : by
Publication details: Addison-Wesley Professional, 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.12 DEN.

29.
Image from Google Jackets
NET Internationalization : by
Publication details: Addison-Wesley Professional, 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 006.76 .NET SMI.

30.
Image from Google Jackets
NET : by
Publication details: Addison-Wesley Professional, 2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 006.76 .NET LEN.

31.
Image from Google Jackets
Smart Client Deployment with ClickOnce : by
Publication details: Addison-Wesley Professional, 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 006.76 .NET NOY.

32.
Image from Google Jackets
The .NET Developer's Guide to Directory Services Programming : by
Publication details: Addison-Wesley Professional, 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 006.76 .NET KAP.

33.
Image from Google Jackets
Real Web Project Management : by
Publication details: Addison-Wesley Professional, 2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 006.76 SHE.

34.
Image from Google Jackets
NET Patterns : by
Publication details: Addison-Wesley Professional, 2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 006.76 .NET THI.

35.
Image from Google Jackets
The .NET Developer's Guide to Windows Security : by
Publication details: Addison-Wesley Professional, 2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 006.76 .NET BRO.

36.
Image from Google Jackets
The Art of Scalability : by
Publication details: Addison-Wesley Professional, 2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.406 ABB.

37.
Image from Google Jackets
Stand Back and Deliver : by
Publication details: Addison-Wesley Professional, 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.4092 PIX.

38.
Image from Google Jackets
Security Metrics : by
Publication details: Addison-Wesley Professional, 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.47015 JAQ.

39.
Image from Google Jackets
Services Blueprint : by
Publication details: Addison-Wesley Professional, 2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658 KAL.

40.
Image from Google Jackets
Impossible Data Warehouse Situations : by
Publication details: Addison-Wesley Professional, 2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.4038 ADE.

41.
Image from Google Jackets
Telecommunications Essentials : by
Publication details: Addison-Wesley Professional, 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 621.382 GOL.

Find us on the map