Βιβλιοθήκη και Κέντρο Πληροφόρησης
Ιονίου Πανεπιστημίου
TextToSpeech Letter_size Contrast Facebook Instagram YouTube          ΑΓΓΛΙΚΑ

Ενημέρωση

ΠΡΟΣΚΤΗΣΕΙΣ ΒΙΒ/ΘΗΚΗΣ ΤΜΗΜΑΤΟΣ ΠΛΗΡΟΦΟΡΙΚΗΣ

ShareThis
Δημοσίευση: 25-11-2006 19:22 | Προβολές: 7420

.Net Compact Framework Programming/ Yao Paul Durant David

3ds Max 8 Essentials/ Autodesk

A Classical Introduction to Cryptography : Applications for Communications Security/ Vaudenay, Serge

A Course in Number Theory and Cryptography/ Koblitz, Neal

A Practical Guide to Managing Information Security/ Purser, Steve

Acoustics And Psychoacoustics/ Howard, David (Head Of Department Of Ele

Advanced Calculus/ Kaplan, Wilfred

Advanced IPSec VPN Design/ Bollapragada, Vijay

Advanced programming in the UNIX environment/ Stevens, Richard

Algebra and Trigonometry/ Cohen, David

Algebra/ Lang, Serge

Algorithm Design/ Tardos,Kleinberg

Algorithms in C: Graph Algorithms/ Sedgewick, Robert

Algorithms Sequential and Parallel: a Unified Approach/ Miller, Russ and Laurence Boxer

An Innovation Approach to Random Fields: Application of White Noise Theory/ Hida, Takeyuki and Si Si

An Introduction to Seismology, Earthquakes and Earth Structure/ Stein, Seth and Michael Wysession

An Introduction To The Modeling Of Neural Networks/ Peretto, Pierre

Applied Control Theory For Embedded Systems/ Wescott, Tim

Applied Cryptography: Protocols, Algorithms and Source Code in C/ Schneier, Bruce

Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers / Mitnick, Kevin D. and William L. Simon

Artificial Intelligence/ Luger, George F.

Asp.Net Unleashed/ Walther

Audio Programming For Interactive Games/ Wilde, Martin

Basic Technical Mathematics with Calculus/ Washington, Allyn J.

Bayesian Data Analysis/ Gelman, Andrew … (et al.)

Bayesian Statistics/ Lee, Peter M.

Beginning Algebra/ Lial, Margaret L., Hornsby, John and Terry McGinnis

Beginning Cryptography with Java / Hook, David

Beginning Java Server Pages/ Chopra Vivek

Beginning SQL Server 2005 Porgramming/ Vieira Robert

Beginning Suse Linux/ Keir Thomas

Beginning Unix/ Love,Merlino,Zimmerman,Reed

Beyond Fear: Thinking Sensibly About Security in an Uncertain World / Schneier, Bruce

Bioinformatics And Molecular Evolution/ Higgs, Paul G. and Teresa K. Attwood

Building ASP.NET Server Controls/ Dale, Michalk and Rob Cameron

Building Better Interfaces/ Bugg

Building Resilient Ip Networks/ Kok-Keong Lee

Bulletproof Wireless Security: GSM, UMTS, 802.11, and Ad Hoc Security/ Chandra, Praphul

Business Planning With Sap Sem/ Fischer

C Programming Language/ Kernighan, Brian W. and Ritchie, Dennis M.

C Προγραμματισμός/ Deitel , H.M. and Deitel, P.J.

C++ For Business Programmers/ Molluzzo

C++ from the ground up/ Schildt, Herbert

Calculus: One and Several Variables/ Salas, Satunino L., Hille, Einar and Garret J. Etgen

Calculus: The Elements/ Comenetz, Michael

Campus Network Design Fundamentals/ Teare, Diane

Cellular Computing/ Amos, Martyn

Classical and Contemporary Cryptology/ Spillman, Richard J.

Color Management For Photographers/ Rodney Andrew

Compilers/ Aho, Alfred V. , Ravi Sethi and Jeffrey D. Ullman

Complex Analysis/ Lang, Serge

Computer Architecture: From Microprocessors To Supercomputers/ Parhami, Behrooz

Computer Networking/ Ross, Keith

Computer Networks & Comp Syst Des & Ar-/ Tanenbaum S, Heuring V.

Computer networks and internets : with Internet applications/ Comer, Douglas E.

Computer Organization and Design: The Hardware/Software Interface/ Patterson, David A
and John L. Hennessy

Computer Privacy Annoyances/ Tynan, Dan

Computer Security Fundamentals/ Easttom, William and Chuck Easttom

Computer Security Handbook/ Hoyt, Douglas B.

Contemporary Cryptography/ Oppliger, Rolf

Cooking With Csound/ Horner, Andrew

Creating Digital Content/ Rice, John

Cryptanalysis of Number Theoretic Ciphers/ Vaudenay, Serge

Cryptography : Theory And Practice/ Stinson Douglas

Cryptography and Network Security: Principles and Practice/ Stallings, William

Cryptography Decrypted / Mel,H.X., Burnett, Doris and Doris M. Baker

Cryptography in C and C++/ Welschenbach, Michael

Cryptography in the Database : The Last Line of Defense/ Kenan, Kevin

Cryptological Mathematics/ Lewand, Robert Edward

Data Compression : The Complete Reference/ Salomon, David

Data Mining Εισαγωγικα Και Προηγμενα Θεματα Εξορυξης Γνωσης Απο Δεδομα/ Dunham, Margaret H.

Data Structures, Algorithms And Applications In Java/ Sahni, Sartaj

Database Administration/ Mullins, Craig S.

Database In Depth/ Date J C

Database Systems/ Kfer & Bernsein

Database Systems/ Rob, Peter

Design patterns: Elements of reusable object-oriented software/ Gamma, Erich,
Johnson,Ralph and Helm, Richard

Developing Java Web Services: Architecting and Developing Secure Web Services Using Java/ Nagappan, Ramesh, Skoczylas,Robert and Rima Patel Sriganesh

Digital Communications/ Proakis, John

Digital Communications: Fundamentals and Applications/ Sklar, Bernard

Digital Copyright: Protecting Intellectual Property on the Internet/ Litman, Jessica

Digital Image Processing/ Woods, Gonzalez

Digital Integrated Circuits/ Rabaey, Jan M. , Anantha Chandrakasan and Borivoje Nikolic

Digital Rights Management: Business and Technology/ Rosenblatt, Bill, Trippe, Bill and Stephen Mooney

Digital Signal Proccessing/ Proakis, John

Digital Systems Engineering/ Dally, William J. and John W. Poulton

Digital Watermarking/ Cox, Ingemar

Disappearing Cryptography, Second Edition - Information Hiding: Steganography and Watermarking/ Wayner, Peter

Dr. Tom Shinder's Configuring ISA Server 2004/ Shinder, Thomas W., Littlejohn Shinder, Debra and Martin Grasdal

Dreamweaver MX 2004 bible/ Lowery, Joseph

E-Commerce Strategy,Technologies And Applications/ Whiteley, David

Effective C#: 50 specific ways to improve your c#/ Wagner, Bill

Effective Java™ Programming Language Guide/ Bloch, Joshua

Elementary Algebra/ Jacobs, Harold R

Elliptic Curves: Number Theory and Cryptography/ Washington, Lawrence C.

Epidemic Modelling/ Daley, D.J.

Essential PHP Security/ Shiflett, Chris

Essentials of Computer Architecture/ Comer, Douglas E.

Evolution and the Theory of Games/ Maynard Smith, John

Evolutionary Games and Population Dynamics/ Hofbauer, Josef and Karl Sigmund

Exploiting Software: How to Break Code/ Rubin , Aviel D. (Foreword)

Eγχειρίδιο Προγραμματισμού Visual C++. Net/ Corera, Aravid

Eγχειρίδιο της C/ Aitken

File System Forensic Analysis/ Carrier, Brian

Firewall Architecture for the Enterprise/ Pohlmann, Norbert and Tim Crothers

Firewalls and Internet Security: Repelling the Wily Hacker/ Cheswick, William R., Bellovin, Steven M. And Aviel D. Rubin

Firewalls and VPN's: Principles and Practices/ Oakes, Edward and Richard Tibbs

Forgotten Algebra/ Lee Bleau, Barbara

Forgotten Calculus/ Lee, Barbara and Ph.D. Bleau

Foundations of Algorithms using C++ Pseudocode/ Neapolitan, Richard and Kumarss Naimipour

Foundations of Cryptography: A Primer / Goldreich, Oded

Foundations of Cryptography: Basic Tools/ Goldreich, Oded

Fractals, Random Shapes and Point Fields: Methods of Geometrical Statistics/ Stoyan, Dietrich and Helga Stoyan

Fundamentals Of Network Security/ Maiwald, Eric
Fundamentals Of Software Engineering/ Ghezzi, Carlo

Fundamentals of Wireless Communication/ Tse, David Tse and Pramod Viswanath

Geometry : Seeing, Doing, Understanding/ Jacobs, Harold R

Google Hacks/ Dornfest, Rael and Tara Calishain

Guide to Elliptic Curve Cryptography/ Hankerson, Darrel, et al.

Guide to LaTeX/ Kopka, Helmut and Patrick W. Daly

Guide To Matlab/ Hunt, Brian R.

Guide To Unix Using Linux/ Palmer, Michael

Hacker culture/ Thomas, Douglas

Hacking Exposed Linux: Linux Security Secrets and Solutions/ Hatch, Brian Lee, James and George Kurtz

Hacking Exposed Windows Server 2003/ Scambray, Joel and Stuart McClure

Hacking Exposed: Network Security Secrets and Solutions/ McClure, Stuart Scambray, Joel and George Kurtz

Hacking the Xbox: An Introduction to Reverse Engineering/ Huang, Andrew

Hacking: The Art of Exploitation/ Erickson, Jon

Handbook For Sound Engineers/ Ballou Glen

Handbook of Applied Cryptography/ Menezes, Alfred J. Oorschot, Paul van and Scott A. Vanston

Image Analysis, Random Fields and Markov Chain Monte Carlo Methods : A Mathematical Introduction/ Winkler, Gerhard

Image Processing/ Petrou, Maria

Implementing SSH: Strategies for Optimizing the Secure Shell/ Dwivedi, H.

Information Security Policies, Procedure/ Peltier

Information Systems/ Benson, Steve

Information Warfare and Security/ Denning, Dorothy E.

Insider Threat:Protecting The Enterprise/ Cole, Ring

interactine TV standards/ Morris, Steven

Interactive TV Standards/ Campbell, Alastair

Intermediate Algebra/ Lial, Margaret L., Hornsby, John and Terry McGinnis

Internet Security : Cryptographic Principles, Algorithms and Protocols/ Man Young Rhee

Introduction to Algorithms/ Cormen, Thomas H. et al.

Introduction to Computer Security/ Bishop, Matthew

Introduction to Cryptography with Coding Theory/ Trappe,Wade and Lawrence C. Washington

Introduction to Cryptography with Java Applets/ Bishop, David

Introduction To Data Compression/ Sayood, Khalid

Introduction To Parallel Computing/ Kumar, Vipin

Introduction To Queueing Networks/ Gelenbe, Erol

Introduction to Random Signals and Applied Kalman Filtering with Matlab Exercises and Solutions/ Brown, Robert Grover and Patrick Y. C. Hwang

Introductory Digital Image Processing/ Rico, Gabriele

Intrusion Detection And Prevention/ Endorf, Carl

Intrusion Prevention & Active Response/ Rash Michael

Intrusion Prevention Fundamentals/ Hogue, Carter

Java Gently/ Bishop, J.M. and Bishop, Judy

Java™ Programming Language, The/ Arnold , Ken, Gosling, James and Holmes, David

JFC Swing Tutorial, The: A Guide to Constructing GUIs/ Walrath, Kathy … (et al.)

Just Java™ 2/ Linden, Peter van der

LaTeX: Line by Line: Tips and Techniques for Do*****ent Processing/ Diller , Antoni

Learning Java/ Niemeyer, Patrick and Jonathan Knudsen

Learning the UNIX Operating System/ Peek, Jerry, Todino-Gonguet, Grace and John Strang

Lerning PHP 5/ Sklar, David

Linear Algebra: A Modern Introduction/ Poole, David

Linkers and Loaders/ Levine, John R

Linux Bible, 2005/ Negus, Christopher

Linux in a Nutshell/ Negus, Christopher

Linux Power Tools/ Smith, Roderick

Linux Server Security/ Bauer, Michael

Local Area Networks/ Stamper, David A.

Malicious Cryptography: Exposing Cryptovirology / Young, Adam and Moti Yung

Markov Chain Monte Carlo: Stochastic Simulation for Bayesian Inference/ Gamerman, Dani

Markov Processes/ Ethier, Stewart

Mathematical Biology I / Murray, J.D.

Mathematics and the Physical World/ Kline, Morris

Mathematics of Classical and Quantum Physics/ Byron, Frederick, Robert, W. and W. Fuller

Mathematics/ Aleksandrov, A. D., A., Kolmogorov, N. and M. A. Lavrentev

Mathematics: A Very Short Introduction/ Gowers, Timothy

MCAD/MCSD Self-Paced Training Kit: Implementing Security for Applications with Microsoft

Visual Basic .NET and Microsoft Visual C# .NET/ Northrup, Anthony

Modeling Dynamic Phenomena in Molecular and Cellular Biology/ Segel, Lee A.

Modelling Biological Populations in Space and Time/ Renshaw, Eric … (et al)

Modern operating systems/ Tanenbaum, Andrew

Modern Operating Systems/ Tanenbaum, Andrew S.

Monte Carlo Strategies in Scientific Computing/ Liu, Jun S.

Multimedia Systems/ Buford, John

Nessus, Snort, & Ethereal Power Tools : Customizing Open Source Security Applications/ Caswell, Brian et al.

Network Defense And Countermeasures/ Easttom, Chuck

Network Modeling, Simulation And Analysis/ Garzia, Ricardo

Network Security Essentials/ Stallings, William

Network Security with OpenSSL/ Viega, Jon, Messier, Matt and Pravir Chandra

New Constructions in Cellular Automata/ Griffeath, David and Cristopher Moore

Nonlinear Dynamics of Interacting Populations/ Bazykin, A. D. et al.

Non-Linear Physics for Beginners: Fractals, Chaos, Pattern Formation, Solutions, Cellular Automata and Complex Systems/ Lam, Lui

Number Theory for Computing/ Yan, Song Y.

Object-Oriented Software Construction/ Meyer, Bertrand

Operating systems concepts with JAVA/ Silberschatz

Operating Systems/ Stallings W.

Optical Networking/ Goralski, Walter

Penetration Testing and Networks Defense/ Whitaker, Andrew and Daniel Newman

PGP : Pretty Good Privacy/ Garfinkel, Simson

Pictorial Communication in Virtual and Real Environments/ S. Ellis M. K., and A. Grunwald

Practical Introduction to Data Structures and Algorithm Analysis/ Shaffer, C

Practical Unix & Internet Security/ Garfinkel, Simson, Spafford,Gene and Alan Schwartz

Probability, Random Variables and Stochastic Processes/ Papoulis, Athanasios and S. Unnikrishna Pillai

Programming .NET Security/ Freeman, Adam and Allen Jones

Programming and Problem Solving with C++/ N. Dale C. W., M. Headington

Programming ASP.NET/ Liberty,Jesse and Dan Hurwitz

Protect Your Windows Network: From Perimeter to Data/ Johansson, Jesper

Protocols and Architectures for Wireless Sensor Networks/ Karl,Holger and Andreas Willig

Public Key Infrastructure: Building Trusted Applications and Web Services/ Vacca, John R.

Python Scripting For Computational Scien/ Langtangen Hans

Radius: Securing Public Access to Private Resources/ Hassell, Jonathan

Random Data: Analysis & Measurement Procedures/ Bendat, Julius S. and Allan G. Piersol

Random Field Models in Earth Sciences/ Christakos, George

Random Signals : Detection, Estimation and Data Analysis/ Shanmugan, K. Sam and Arthur M. Breipohl

Random Walks in Biology/ Berg, Howard C.

Real 802.11 Security: Wi-Fi Protected Access and 802.11i/ Edney, Jon and William A. Arbaugh

Real Digital Forensics : Computer Security and Incident Response/ Jones, Keith J., Bejtlich, Richard and Curtis W. Rose

Real-Time Systems/ Liu, Jane W. S.

Red Hat Linux 9/ Barkakati

Rfid Security/ Lindstrom, Lanthem, Thorton

Rootkits : Subverting the Windows Kernel/ Hoglund, Greg and Jamie Butler

Routing TCP/IP / Doyle, Jeff and Lennifer Carroll

Secrets and Lies: Digital Security in a Networked World/ Schneier, Bruce

Secrets Of Podcasting/ Farkas B.

Secure Coding: Principles and Practices/ Graff, Mark G. and Kenneth R. Van Wyk

Secure Programming Cookbook for C and C++/ Viega, John and Matt Messier

Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML

Signature and XML Encryption/ Rosenberg, Jothy and David Remy

Security Engineering: A Guide to Building Dependable Distributed Systems/ Anderson, Ross

Security in Computing/ Pfleeger, Charles P. and Shari Lawrence Pfleeger

Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications/
Schafer, Gunter and GÙnter Schdfer

Security in Wireless LANs and MANs / Hardjono, Thomas and Lakshminath R. Dondeti

Service-Oriented Architecture : Concepts, Technology, and Design/ Erl, Thomas

Service-Oriented Computing : Semantics, Processes, Agents/ Singh, Munindar P. and Michael N. Huhns

Simulation and the Monte Carlo Method/ Rubinstein, Reuven Y.

Software Engineering Standards/ Moore, James W.

Spatial Ecology via Reaction-Diffusion Equations/ Cosner, Chris and Robert Stephen Cantrell

Stealing the Network : How to Own an Identity/ Mullen,Timothy et al.

Stochastic Modelling For Systems Biology/ James, Darren Wilkinson

Stochastic Population Dynamics in Ecology and Conservation/ Lande, Russell et al

Stochastic Simulation/ Ripley, Brian

Structured Computer Organization/ Tanenbaum, Andrew S.

The Art Of Computer Programming:Fascicle I/ Knuth,Donald

The Art of Deception: Controlling the Human Element of Security/ Mitnick, Kevin D. and William L. Simon

The Calculus Gallery : Masterpieces from Newton to Lebesgue/ Dunham, William

The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet/ Kahn, David

The Database Hacker's Handbook/ David Litchfield, et al.

The Design of Rijndael: AES - The Advanced Encryption Standard/ Freeman, Adam and Allen Jones

The Information Society: Issues and Illusions/ Lyon, D

The Legal and Regulatory Environment of Business w/ PowerWeb/ O. Lee Reed et al.

The Man Who Knew Too Much: Alan Turing and the Invention of the Computer/ Leavitt, David

The Shellcoder's Handbook : Discovering and Exploiting Security Holes/ Koziol, Jack et al.

Theory, method and practice in computer content analysis/ West, Mark

Thinking in Java/ Eckel, Bruce

UMTS Security/ Niemi, Valtteri and Kaisa Nyberg

Undergraduate Algebra/ Lang, Serge
Understanding PKI: Concepts, Standards, and Deployment Considerations/ Adams, Carlisle and Steve Lloyd

User's Guide to Cryptography and Standards/ Dent, Alex W. and Chris J. Mitchell

Voice over IP First-Step/ Wallace, Kevin

Web Programming/ Bates, C.D.

Web Security, Privacy and Commerce/ Garfinkel, Simson

WI-FOO: The Secrets of Wireless Hacking/ Gavrilenko, Konstantin, Mikhailovsky, Andrei and Keith Mulbery

Wireless Communications And Networks/ Stallings, William

Wireless Networks: Multiuser Detection in Cross-Layer Design/ Earle, Aaron E.

Wireless Operational Security/ Rittinghouse, John and James Ransome

Wireless Security Handbook/ Earle, Aaron E.

Wireless Security: Models, Threats and Solutions/ Nichols, Randall and Panos Lekkas

Wireless Sensor Networks/ Bulusu, Nirupama and Sanjay Jha

Writing Information Security Policies/ Barman, Scott

Writing Secure Code/ Howard, M.

Αγγλοελληνικό Αναλυτικό Λεξικό Η/Υ Νέας Τεχνολογίας. Οδηγός Εφαρμογών/ Δεσπότης, Γιώργος

Αλγόριθμοι - Σχεδιασμός και Ανάλυση/ Μποζάνης, Π.

Αλγόριθμοι Σε C -/ Sedgewick Robert

Αλγόριθμοι: Μέθοδοι Σχεδίασης και Ανάλυση Πολυπλοκότητας/ Αφράτη, Φ. και Γ. Παπαγεωργίου

Αντικειμενοστρεφής Προγραμματισμός C++/ Robert Lafore

Απαντήσεις στα προβλήματα της C/ Tondo

Από τις αριθμομηχανές στην κοινωνία της πληροφορίας/ Παναγιωτακόπουλος, Χ.

Δεξιότητες στην Κοινωνία της Πληροφορίας, Εφαρμογές Πληροφορικής/ Γκιμπερίτης, Β.

Διαδικαστικός Προγραμματισμός C/ Θραμπουλίδης, Κλεάνθης

Διαδίκτυα Με Tcp/Ip Αρχές, Πρωτόκολλα, Και Αρχιτεκτονικές/ Comer, Douglas E.

Διαδικτυακός Προγραμματισμός Java/ Παναγιωτόπουλος, Ιωάννης

Δίκτυα Και Διαδίκτυα Υπολογιστών Και Εφαρμογές Τους Στο Internet/ Comer, Douglas E.

Δίκτυα Υπολογιστών/ Tanenbaum, Andrew S.

Δικτυωτή Υπολογιστών/ Kurose, James

Δομές Δεδομένων Αλγόριθμοι και Εφαρμογές στην C++/ Sahni, S

Δομές Δεδομένων και Αρχεία στην C/ Ζάρκος, Σπύρος

Δομές Δεδομένων και οργανώσεις αρχείων/ Κοίλιας, Χ

Δομές Δεδομένων, Ταξινόμηση και Αναζήτηση/ Μποζάνης

Εισαγωγή Στη Uml Συνοπτικός Οδηγός Της Πρότυπης Γλώσσας Μοντελοποίησης/Fowler, Martin

Εισαγωγή Στην Επικοινωνία Ανθρώπου-Υπολογιστή/ Αβούρης, Νικόλαος

Εισαγωγή στις νέες τεχνολογίες επικοινωνιών/ Ποµπόρτσης, Ε

Εξόρυξη Γνώσης Από Βάσεις Δεδομένων/ Βαζιργιάννης, Μιχάλης

Ευφυής έλεγχος/ Κίνγκ , Ροβέρτος-Ερρίκος

Η Γλώσσα C Σε Βάθος/ Χατζηγιαννάκης Νίκος

Η Γλώσσα προγραμματισμού C/ Kernighan, Brian W

Η τέχνη και η επιστήμη της C/ Roberts, Eric

Η τεχνολογία της Πληροφίας και Επικοινωνίας στη Σύγχρονη Επιχείρηση/ Α. Δημητριάδης Χ. Κ., Θ. Κώστας,

Κατανεμημένα συστήματα σε Java/ Καβουράς, Μήλης, Ρουκουνάκη

Λειτουργικά Συστήματα: Συστήματα Υπολογιστών/ Καβουρας, Ιωάννης Κ.
Λειτουργικά συστήματα ΙΙ/ Κάβουρας, Ιωάννης

Λειτουργικά Συστήματα Και Εφαρμογές Προγραμματισμού/ Gretzinger, Klaus

Μάθετε τη C σε 24 ώρες/ Ζhang

Μαθήματα Βάσεων Δεδομένων/ Δερβος, Δημητρης Α.

Νέες δυνατότητες και προοπτικές στην κοινωνία των πληροφοριών/ Λαζακίδου, Α. Γ. Λ. ,

Οδηγός για το Mathematica / Παπαδάκης , Κωνσταντίνος Ε.

Οδηγός του Linux/ Welsh

Πλήρες εγχειρίδιο του Flash MX 2004/Pucknell Hogg & Swan

Πρωτόκολλο Tcp/Ip/ Behrouz A Forouzan

Στον αιώνα της Πληροφορίας/ Αναστασιάδης, Π. Σ

Σύγχρονα λειτουργικά συστήματα/ Tanenbaum, Andrew

Σχεσιακές Βάσεις Δεδομένων/ Κεχρής Ευάγγελος

Τεχνητή Νοημοσύνη/ Russell,Norving

Τεχνολογία Λογισμικού Θεωρία Και Πράξη/ Pfleeger, Shari Lawrence

Τεχνολογία Λογισμικού Κωδικοποίηση, Έλεγχος Και Συντήρηση Λογισμικού/ Γιακουμάκης, Εμμανουήλ Α.

Τεχνολογία Πολυμέσων/ Παπαδημητρίου, Αλέξανδρος Γ.

Το λειτουργικό σύστημα Linux/ Μάργαρης, Αθανάσιος

Το Περιβάλλον Προγραμματισμού Unix/ Kernighan, Brian W.

Υπηρεσίες προστιθέμενης αξίας στο Διαδίκτυο/ Α. Πομπόρτσης Α. Μ.,

Ψηφιακή Επεξεργασία Ήχου Με Το Sound Forge/ Σαρτζετακης, Χρηστος Ε.

Επιστροφή
Ιόνιο Πανεπιστήμιο
Ιόνιο Πανεπιστήμιο
www.ionio.gr
Lock Δυστυχώς, δεν έχετε πρόσβαση στις ηλεκτρονικές συνδρομητικές πηγές της Βιβλιοθήκης!
Οδηγίες VPN