.Net Compact Framework Programming/ Yao Paul Durant David
3ds Max 8 Essentials/ Autodesk
A Classical Introduction to Cryptography : Applications for Communications Security/ Vaudenay, Serge
A Course in Number Theory and Cryptography/ Koblitz, Neal
A Practical Guide to Managing Information Security/ Purser, Steve
Acoustics And Psychoacoustics/ Howard, David (Head Of Department Of Ele
Advanced Calculus/ Kaplan, Wilfred
Advanced IPSec VPN Design/ Bollapragada, Vijay
Advanced programming in the UNIX environment/ Stevens, Richard
Algebra and Trigonometry/ Cohen, David
Algebra/ Lang, Serge
Algorithm Design/ Tardos,Kleinberg
Algorithms in C: Graph Algorithms/ Sedgewick, Robert
Algorithms Sequential and Parallel: a Unified Approach/ Miller, Russ and Laurence Boxer
An Innovation Approach to Random Fields: Application of White Noise Theory/ Hida, Takeyuki and Si Si
An Introduction to Seismology, Earthquakes and Earth Structure/ Stein, Seth and Michael Wysession
An Introduction To The Modeling Of Neural Networks/ Peretto, Pierre
Applied Control Theory For Embedded Systems/ Wescott, Tim
Applied Cryptography: Protocols, Algorithms and Source Code in C/ Schneier, Bruce
Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers / Mitnick, Kevin D. and William L. Simon
Artificial Intelligence/ Luger, George F.
Asp.Net Unleashed/ Walther
Audio Programming For Interactive Games/ Wilde, Martin
Basic Technical Mathematics with Calculus/ Washington, Allyn J.
Bayesian Data Analysis/ Gelman, Andrew … (et al.)
Bayesian Statistics/ Lee, Peter M.
Beginning Algebra/ Lial, Margaret L., Hornsby, John and Terry McGinnis
Beginning Cryptography with Java / Hook, David
Beginning Java Server Pages/ Chopra Vivek
Beginning SQL Server 2005 Porgramming/ Vieira Robert
Beginning Suse Linux/ Keir Thomas
Beginning Unix/ Love,Merlino,Zimmerman,Reed
Beyond Fear: Thinking Sensibly About Security in an Uncertain World / Schneier, Bruce
Bioinformatics And Molecular Evolution/ Higgs, Paul G. and Teresa K. Attwood
Building ASP.NET Server Controls/ Dale, Michalk and Rob Cameron
Building Better Interfaces/ Bugg
Building Resilient Ip Networks/ Kok-Keong Lee
Bulletproof Wireless Security: GSM, UMTS, 802.11, and Ad Hoc Security/ Chandra, Praphul
Business Planning With Sap Sem/ Fischer
C Programming Language/ Kernighan, Brian W. and Ritchie, Dennis M.
C Προγραμματισμός/ Deitel , H.M. and Deitel, P.J.
C++ For Business Programmers/ Molluzzo
C++ from the ground up/ Schildt, Herbert
Calculus: One and Several Variables/ Salas, Satunino L., Hille, Einar and Garret J. Etgen
Calculus: The Elements/ Comenetz, Michael
Campus Network Design Fundamentals/ Teare, Diane
Cellular Computing/ Amos, Martyn
Classical and Contemporary Cryptology/ Spillman, Richard J.
Color Management For Photographers/ Rodney Andrew
Compilers/ Aho, Alfred V. , Ravi Sethi and Jeffrey D. Ullman
Complex Analysis/ Lang, Serge
Computer Architecture: From Microprocessors To Supercomputers/ Parhami, Behrooz
Computer Networking/ Ross, Keith
Computer Networks & Comp Syst Des & Ar-/ Tanenbaum S, Heuring V.
Computer networks and internets : with Internet applications/ Comer, Douglas E.
Computer Organization and Design: The Hardware/Software Interface/ Patterson, David A
and John L. Hennessy
Computer Privacy Annoyances/ Tynan, Dan
Computer Security Fundamentals/ Easttom, William and Chuck Easttom
Computer Security Handbook/ Hoyt, Douglas B.
Contemporary Cryptography/ Oppliger, Rolf
Cooking With Csound/ Horner, Andrew
Creating Digital Content/ Rice, John
Cryptanalysis of Number Theoretic Ciphers/ Vaudenay, Serge
Cryptography : Theory And Practice/ Stinson Douglas
Cryptography and Network Security: Principles and Practice/ Stallings, William
Cryptography Decrypted / Mel,H.X., Burnett, Doris and Doris M. Baker
Cryptography in C and C++/ Welschenbach, Michael
Cryptography in the Database : The Last Line of Defense/ Kenan, Kevin
Cryptological Mathematics/ Lewand, Robert Edward
Data Compression : The Complete Reference/ Salomon, David
Data Mining Εισαγωγικα Και Προηγμενα Θεματα Εξορυξης Γνωσης Απο Δεδομα/ Dunham, Margaret H.
Data Structures, Algorithms And Applications In Java/ Sahni, Sartaj
Database Administration/ Mullins, Craig S.
Database In Depth/ Date J C
Database Systems/ Kfer & Bernsein
Database Systems/ Rob, Peter
Design patterns: Elements of reusable object-oriented software/ Gamma, Erich,
Johnson,Ralph and Helm, Richard
Developing Java Web Services: Architecting and Developing Secure Web Services Using Java/ Nagappan, Ramesh, Skoczylas,Robert and Rima Patel Sriganesh
Digital Communications/ Proakis, John
Digital Communications: Fundamentals and Applications/ Sklar, Bernard
Digital Copyright: Protecting Intellectual Property on the Internet/ Litman, Jessica
Digital Image Processing/ Woods, Gonzalez
Digital Integrated Circuits/ Rabaey, Jan M. , Anantha Chandrakasan and Borivoje Nikolic
Digital Rights Management: Business and Technology/ Rosenblatt, Bill, Trippe, Bill and Stephen Mooney
Digital Signal Proccessing/ Proakis, John
Digital Systems Engineering/ Dally, William J. and John W. Poulton
Digital Watermarking/ Cox, Ingemar
Disappearing Cryptography, Second Edition - Information Hiding: Steganography and Watermarking/ Wayner, Peter
Dr. Tom Shinder's Configuring ISA Server 2004/ Shinder, Thomas W., Littlejohn Shinder, Debra and Martin Grasdal
Dreamweaver MX 2004 bible/ Lowery, Joseph
E-Commerce Strategy,Technologies And Applications/ Whiteley, David
Effective C#: 50 specific ways to improve your c#/ Wagner, Bill
Effective Java™ Programming Language Guide/ Bloch, Joshua
Elementary Algebra/ Jacobs, Harold R
Elliptic Curves: Number Theory and Cryptography/ Washington, Lawrence C.
Epidemic Modelling/ Daley, D.J.
Essential PHP Security/ Shiflett, Chris
Essentials of Computer Architecture/ Comer, Douglas E.
Evolution and the Theory of Games/ Maynard Smith, John
Evolutionary Games and Population Dynamics/ Hofbauer, Josef and Karl Sigmund
Exploiting Software: How to Break Code/ Rubin , Aviel D. (Foreword)
Eγχειρίδιο Προγραμματισμού Visual C++. Net/ Corera, Aravid
Eγχειρίδιο της C/ Aitken
File System Forensic Analysis/ Carrier, Brian
Firewall Architecture for the Enterprise/ Pohlmann, Norbert and Tim Crothers
Firewalls and Internet Security: Repelling the Wily Hacker/ Cheswick, William R., Bellovin, Steven M. And Aviel D. Rubin
Firewalls and VPN's: Principles and Practices/ Oakes, Edward and Richard Tibbs
Forgotten Algebra/ Lee Bleau, Barbara
Forgotten Calculus/ Lee, Barbara and Ph.D. Bleau
Foundations of Algorithms using C++ Pseudocode/ Neapolitan, Richard and Kumarss Naimipour
Foundations of Cryptography: A Primer / Goldreich, Oded
Foundations of Cryptography: Basic Tools/ Goldreich, Oded
Fractals, Random Shapes and Point Fields: Methods of Geometrical Statistics/ Stoyan, Dietrich and Helga Stoyan
Fundamentals Of Network Security/ Maiwald, Eric
Fundamentals Of Software Engineering/ Ghezzi, Carlo
Fundamentals of Wireless Communication/ Tse, David Tse and Pramod Viswanath
Geometry : Seeing, Doing, Understanding/ Jacobs, Harold R
Google Hacks/ Dornfest, Rael and Tara Calishain
Guide to Elliptic Curve Cryptography/ Hankerson, Darrel, et al.
Guide to LaTeX/ Kopka, Helmut and Patrick W. Daly
Guide To Matlab/ Hunt, Brian R.
Guide To Unix Using Linux/ Palmer, Michael
Hacker culture/ Thomas, Douglas
Hacking Exposed Linux: Linux Security Secrets and Solutions/ Hatch, Brian Lee, James and George Kurtz
Hacking Exposed Windows Server 2003/ Scambray, Joel and Stuart McClure
Hacking Exposed: Network Security Secrets and Solutions/ McClure, Stuart Scambray, Joel and George Kurtz
Hacking the Xbox: An Introduction to Reverse Engineering/ Huang, Andrew
Hacking: The Art of Exploitation/ Erickson, Jon
Handbook For Sound Engineers/ Ballou Glen
Handbook of Applied Cryptography/ Menezes, Alfred J. Oorschot, Paul van and Scott A. Vanston
Image Analysis, Random Fields and Markov Chain Monte Carlo Methods : A Mathematical Introduction/ Winkler, Gerhard
Image Processing/ Petrou, Maria
Implementing SSH: Strategies for Optimizing the Secure Shell/ Dwivedi, H.
Information Security Policies, Procedure/ Peltier
Information Systems/ Benson, Steve
Information Warfare and Security/ Denning, Dorothy E.
Insider Threat:Protecting The Enterprise/ Cole, Ring
interactine TV standards/ Morris, Steven
Interactive TV Standards/ Campbell, Alastair
Intermediate Algebra/ Lial, Margaret L., Hornsby, John and Terry McGinnis
Internet Security : Cryptographic Principles, Algorithms and Protocols/ Man Young Rhee
Introduction to Algorithms/ Cormen, Thomas H. et al.
Introduction to Computer Security/ Bishop, Matthew
Introduction to Cryptography with Coding Theory/ Trappe,Wade and Lawrence C. Washington
Introduction to Cryptography with Java Applets/ Bishop, David
Introduction To Data Compression/ Sayood, Khalid
Introduction To Parallel Computing/ Kumar, Vipin
Introduction To Queueing Networks/ Gelenbe, Erol
Introduction to Random Signals and Applied Kalman Filtering with Matlab Exercises and Solutions/ Brown, Robert Grover and Patrick Y. C. Hwang
Introductory Digital Image Processing/ Rico, Gabriele
Intrusion Detection And Prevention/ Endorf, Carl
Intrusion Prevention & Active Response/ Rash Michael
Intrusion Prevention Fundamentals/ Hogue, Carter
Java Gently/ Bishop, J.M. and Bishop, Judy
Java™ Programming Language, The/ Arnold , Ken, Gosling, James and Holmes, David
JFC Swing Tutorial, The: A Guide to Constructing GUIs/ Walrath, Kathy … (et al.)
Just Java™ 2/ Linden, Peter van der
LaTeX: Line by Line: Tips and Techniques for Do*****ent Processing/ Diller , Antoni
Learning Java/ Niemeyer, Patrick and Jonathan Knudsen
Learning the UNIX Operating System/ Peek, Jerry, Todino-Gonguet, Grace and John Strang
Lerning PHP 5/ Sklar, David
Linear Algebra: A Modern Introduction/ Poole, David
Linkers and Loaders/ Levine, John R
Linux Bible, 2005/ Negus, Christopher
Linux in a Nutshell/ Negus, Christopher
Linux Power Tools/ Smith, Roderick
Linux Server Security/ Bauer, Michael
Local Area Networks/ Stamper, David A.
Malicious Cryptography: Exposing Cryptovirology / Young, Adam and Moti Yung
Markov Chain Monte Carlo: Stochastic Simulation for Bayesian Inference/ Gamerman, Dani
Markov Processes/ Ethier, Stewart
Mathematical Biology I / Murray, J.D.
Mathematics and the Physical World/ Kline, Morris
Mathematics of Classical and Quantum Physics/ Byron, Frederick, Robert, W. and W. Fuller
Mathematics/ Aleksandrov, A. D., A., Kolmogorov, N. and M. A. Lavrentev
Mathematics: A Very Short Introduction/ Gowers, Timothy
MCAD/MCSD Self-Paced Training Kit: Implementing Security for Applications with Microsoft
Visual Basic .NET and Microsoft Visual C# .NET/ Northrup, Anthony
Modeling Dynamic Phenomena in Molecular and Cellular Biology/ Segel, Lee A.
Modelling Biological Populations in Space and Time/ Renshaw, Eric … (et al)
Modern operating systems/ Tanenbaum, Andrew
Modern Operating Systems/ Tanenbaum, Andrew S.
Monte Carlo Strategies in Scientific Computing/ Liu, Jun S.
Multimedia Systems/ Buford, John
Nessus, Snort, & Ethereal Power Tools : Customizing Open Source Security Applications/ Caswell, Brian et al.
Network Defense And Countermeasures/ Easttom, Chuck
Network Modeling, Simulation And Analysis/ Garzia, Ricardo
Network Security Essentials/ Stallings, William
Network Security with OpenSSL/ Viega, Jon, Messier, Matt and Pravir Chandra
New Constructions in Cellular Automata/ Griffeath, David and Cristopher Moore
Nonlinear Dynamics of Interacting Populations/ Bazykin, A. D. et al.
Non-Linear Physics for Beginners: Fractals, Chaos, Pattern Formation, Solutions, Cellular Automata and Complex Systems/ Lam, Lui
Number Theory for Computing/ Yan, Song Y.
Object-Oriented Software Construction/ Meyer, Bertrand
Operating systems concepts with JAVA/ Silberschatz
Operating Systems/ Stallings W.
Optical Networking/ Goralski, Walter
Penetration Testing and Networks Defense/ Whitaker, Andrew and Daniel Newman
PGP : Pretty Good Privacy/ Garfinkel, Simson
Pictorial Communication in Virtual and Real Environments/ S. Ellis M. K., and A. Grunwald
Practical Introduction to Data Structures and Algorithm Analysis/ Shaffer, C
Practical Unix & Internet Security/ Garfinkel, Simson, Spafford,Gene and Alan Schwartz
Probability, Random Variables and Stochastic Processes/ Papoulis, Athanasios and S. Unnikrishna Pillai
Programming .NET Security/ Freeman, Adam and Allen Jones
Programming and Problem Solving with C++/ N. Dale C. W., M. Headington
Programming ASP.NET/ Liberty,Jesse and Dan Hurwitz
Protect Your Windows Network: From Perimeter to Data/ Johansson, Jesper
Protocols and Architectures for Wireless Sensor Networks/ Karl,Holger and Andreas Willig
Public Key Infrastructure: Building Trusted Applications and Web Services/ Vacca, John R.
Python Scripting For Computational Scien/ Langtangen Hans
Radius: Securing Public Access to Private Resources/ Hassell, Jonathan
Random Data: Analysis & Measurement Procedures/ Bendat, Julius S. and Allan G. Piersol
Random Field Models in Earth Sciences/ Christakos, George
Random Signals : Detection, Estimation and Data Analysis/ Shanmugan, K. Sam and Arthur M. Breipohl
Random Walks in Biology/ Berg, Howard C.
Real 802.11 Security: Wi-Fi Protected Access and 802.11i/ Edney, Jon and William A. Arbaugh
Real Digital Forensics : Computer Security and Incident Response/ Jones, Keith J., Bejtlich, Richard and Curtis W. Rose
Real-Time Systems/ Liu, Jane W. S.
Red Hat Linux 9/ Barkakati
Rfid Security/ Lindstrom, Lanthem, Thorton
Rootkits : Subverting the Windows Kernel/ Hoglund, Greg and Jamie Butler
Routing TCP/IP / Doyle, Jeff and Lennifer Carroll
Secrets and Lies: Digital Security in a Networked World/ Schneier, Bruce
Secrets Of Podcasting/ Farkas B.
Secure Coding: Principles and Practices/ Graff, Mark G. and Kenneth R. Van Wyk
Secure Programming Cookbook for C and C++/ Viega, John and Matt Messier
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML
Signature and XML Encryption/ Rosenberg, Jothy and David Remy
Security Engineering: A Guide to Building Dependable Distributed Systems/ Anderson, Ross
Security in Computing/ Pfleeger, Charles P. and Shari Lawrence Pfleeger
Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications/
Schafer, Gunter and GÙnter Schdfer
Security in Wireless LANs and MANs / Hardjono, Thomas and Lakshminath R. Dondeti
Service-Oriented Architecture : Concepts, Technology, and Design/ Erl, Thomas
Service-Oriented Computing : Semantics, Processes, Agents/ Singh, Munindar P. and Michael N. Huhns
Simulation and the Monte Carlo Method/ Rubinstein, Reuven Y.
Software Engineering Standards/ Moore, James W.
Spatial Ecology via Reaction-Diffusion Equations/ Cosner, Chris and Robert Stephen Cantrell
Stealing the Network : How to Own an Identity/ Mullen,Timothy et al.
Stochastic Modelling For Systems Biology/ James, Darren Wilkinson
Stochastic Population Dynamics in Ecology and Conservation/ Lande, Russell et al
Stochastic Simulation/ Ripley, Brian
Structured Computer Organization/ Tanenbaum, Andrew S.
The Art Of Computer Programming:Fascicle I/ Knuth,Donald
The Art of Deception: Controlling the Human Element of Security/ Mitnick, Kevin D. and William L. Simon
The Calculus Gallery : Masterpieces from Newton to Lebesgue/ Dunham, William
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet/ Kahn, David
The Database Hacker's Handbook/ David Litchfield, et al.
The Design of Rijndael: AES - The Advanced Encryption Standard/ Freeman, Adam and Allen Jones
The Information Society: Issues and Illusions/ Lyon, D
The Legal and Regulatory Environment of Business w/ PowerWeb/ O. Lee Reed et al.
The Man Who Knew Too Much: Alan Turing and the Invention of the Computer/ Leavitt, David
The Shellcoder's Handbook : Discovering and Exploiting Security Holes/ Koziol, Jack et al.
Theory, method and practice in computer content analysis/ West, Mark
Thinking in Java/ Eckel, Bruce
UMTS Security/ Niemi, Valtteri and Kaisa Nyberg
Undergraduate Algebra/ Lang, Serge
Understanding PKI: Concepts, Standards, and Deployment Considerations/ Adams, Carlisle and Steve Lloyd
User's Guide to Cryptography and Standards/ Dent, Alex W. and Chris J. Mitchell
Voice over IP First-Step/ Wallace, Kevin
Web Programming/ Bates, C.D.
Web Security, Privacy and Commerce/ Garfinkel, Simson
WI-FOO: The Secrets of Wireless Hacking/ Gavrilenko, Konstantin, Mikhailovsky, Andrei and Keith Mulbery
Wireless Communications And Networks/ Stallings, William
Wireless Networks: Multiuser Detection in Cross-Layer Design/ Earle, Aaron E.
Wireless Operational Security/ Rittinghouse, John and James Ransome
Wireless Security Handbook/ Earle, Aaron E.
Wireless Security: Models, Threats and Solutions/ Nichols, Randall and Panos Lekkas
Wireless Sensor Networks/ Bulusu, Nirupama and Sanjay Jha
Writing Information Security Policies/ Barman, Scott
Writing Secure Code/ Howard, M.
Αγγλοελληνικό Αναλυτικό Λεξικό Η/Υ Νέας Τεχνολογίας. Οδηγός Εφαρμογών/ Δεσπότης, Γιώργος
Αλγόριθμοι - Σχεδιασμός και Ανάλυση/ Μποζάνης, Π.
Αλγόριθμοι Σε C -/ Sedgewick Robert
Αλγόριθμοι: Μέθοδοι Σχεδίασης και Ανάλυση Πολυπλοκότητας/ Αφράτη, Φ. και Γ. Παπαγεωργίου
Αντικειμενοστρεφής Προγραμματισμός C++/ Robert Lafore
Απαντήσεις στα προβλήματα της C/ Tondo
Από τις αριθμομηχανές στην κοινωνία της πληροφορίας/ Παναγιωτακόπουλος, Χ.
Δεξιότητες στην Κοινωνία της Πληροφορίας, Εφαρμογές Πληροφορικής/ Γκιμπερίτης, Β.
Διαδικαστικός Προγραμματισμός C/ Θραμπουλίδης, Κλεάνθης
Διαδίκτυα Με Tcp/Ip Αρχές, Πρωτόκολλα, Και Αρχιτεκτονικές/ Comer, Douglas E.
Διαδικτυακός Προγραμματισμός Java/ Παναγιωτόπουλος, Ιωάννης
Δίκτυα Και Διαδίκτυα Υπολογιστών Και Εφαρμογές Τους Στο Internet/ Comer, Douglas E.
Δίκτυα Υπολογιστών/ Tanenbaum, Andrew S.
Δικτυωτή Υπολογιστών/ Kurose, James
Δομές Δεδομένων Αλγόριθμοι και Εφαρμογές στην C++/ Sahni, S
Δομές Δεδομένων και Αρχεία στην C/ Ζάρκος, Σπύρος
Δομές Δεδομένων και οργανώσεις αρχείων/ Κοίλιας, Χ
Δομές Δεδομένων, Ταξινόμηση και Αναζήτηση/ Μποζάνης
Εισαγωγή Στη Uml Συνοπτικός Οδηγός Της Πρότυπης Γλώσσας Μοντελοποίησης/Fowler, Martin
Εισαγωγή Στην Επικοινωνία Ανθρώπου-Υπολογιστή/ Αβούρης, Νικόλαος
Εισαγωγή στις νέες τεχνολογίες επικοινωνιών/ Ποµπόρτσης, Ε
Εξόρυξη Γνώσης Από Βάσεις Δεδομένων/ Βαζιργιάννης, Μιχάλης
Ευφυής έλεγχος/ Κίνγκ , Ροβέρτος-Ερρίκος
Η Γλώσσα C Σε Βάθος/ Χατζηγιαννάκης Νίκος
Η Γλώσσα προγραμματισμού C/ Kernighan, Brian W
Η τέχνη και η επιστήμη της C/ Roberts, Eric
Η τεχνολογία της Πληροφίας και Επικοινωνίας στη Σύγχρονη Επιχείρηση/ Α. Δημητριάδης Χ. Κ., Θ. Κώστας,
Κατανεμημένα συστήματα σε Java/ Καβουράς, Μήλης, Ρουκουνάκη
Λειτουργικά Συστήματα: Συστήματα Υπολογιστών/ Καβουρας, Ιωάννης Κ.
Λειτουργικά συστήματα ΙΙ/ Κάβουρας, Ιωάννης
Λειτουργικά Συστήματα Και Εφαρμογές Προγραμματισμού/ Gretzinger, Klaus
Μάθετε τη C σε 24 ώρες/ Ζhang
Μαθήματα Βάσεων Δεδομένων/ Δερβος, Δημητρης Α.
Νέες δυνατότητες και προοπτικές στην κοινωνία των πληροφοριών/ Λαζακίδου, Α. Γ. Λ. ,
Οδηγός για το Mathematica / Παπαδάκης , Κωνσταντίνος Ε.
Οδηγός του Linux/ Welsh
Πλήρες εγχειρίδιο του Flash MX 2004/Pucknell Hogg & Swan
Πρωτόκολλο Tcp/Ip/ Behrouz A Forouzan
Στον αιώνα της Πληροφορίας/ Αναστασιάδης, Π. Σ
Σύγχρονα λειτουργικά συστήματα/ Tanenbaum, Andrew
Σχεσιακές Βάσεις Δεδομένων/ Κεχρής Ευάγγελος
Τεχνητή Νοημοσύνη/ Russell,Norving
Τεχνολογία Λογισμικού Θεωρία Και Πράξη/ Pfleeger, Shari Lawrence
Τεχνολογία Λογισμικού Κωδικοποίηση, Έλεγχος Και Συντήρηση Λογισμικού/ Γιακουμάκης, Εμμανουήλ Α.
Τεχνολογία Πολυμέσων/ Παπαδημητρίου, Αλέξανδρος Γ.
Το λειτουργικό σύστημα Linux/ Μάργαρης, Αθανάσιος
Το Περιβάλλον Προγραμματισμού Unix/ Kernighan, Brian W.
Υπηρεσίες προστιθέμενης αξίας στο Διαδίκτυο/ Α. Πομπόρτσης Α. Μ.,
Ψηφιακή Επεξεργασία Ήχου Με Το Sound Forge/ Σαρτζετακης, Χρηστος Ε.