Steven Holzner. Perl Black Book, Coriolis, Scottsdale, AZ,
1999
Friedhelm Hukkebrand, editor. GSM and UMTS: The Creation of
Global Mobile Communication, Wiley and Sons, New York, NY, 2002
Watts S. Humphrey. Managing the Software
Process, Addison-Wesley, New York, NY, 1990
Timothy M. Jurgensen and Scott B. Guthery. Smart Cards, the
Developer’s Toolkit, Prentice Hall, Upper Saddle River, NJ, 2002
Michael Kay. XPATH 2.0 Programmer’s Reference, Wiley,
Indianapolis, IN, 2004
Michael Kay. XSLT 2.0 Programmer’s Reference, Wiley,
Indianapolis, IN, 2004
Brian W. Kernighan. The UNIX Programming Environment,
Prentice-Hall, Englewood Cliffs, NJ, 1984
Brian W. Kernighan and P.J. Plauger. The Elements of
Programming Style, McGraw-Hill, Boston, MA, 1978
Brian W. Kernighan and Dennis M. Ritchie. The C Programming
Language, Prentice-Hall, Englewood Cliffs, NJ, 1978
Tarun Khanna., Foundations of Neural Networks,
Addison-Wesley, Reading, MA, 1990
Benjamin Kuipers. Qualitative Reasoning, Modeling and
Simulation with Incomplete Knowledge, MIT Press, Cambridge, MA, 1994
Lee W. Lacy. OWL: Representing Information Using the Web
Ontology Language, Trafford, Victoria, BC, Canada
Brian A. LaMacchia, Matthew Lyons, Sebastian Lange, Rudi
Martin and Kevin T. Price. .NET Framework Security, Pearson Education,
Indianapolis, IN, 2002
Christopher G. Langdon, editor. Artificial Life III,
Addison-Wesley, Reading, MA, 1994
Henry Ledgard. ADA An Introduction and Reference Manual
(July 1980), Springer-Verlag, New York, NY, 1981
Donald Lewine. POSIX Programmer’s Guide: Writing Portable
UNIX Programs, O’Reilly, Sebastopol, CA, 1991
Tim Lindholm and Frank Yellin. The Java Virtual Machine
Specification, Addison-Wesley, Boston, MA, 1997
Anton Meijer and Paul Peeters. Computer Network Architectures,
Computer Science Press, London, UK, 1982
Alfred J. Menezes, Paul C. van Oorschot and Scott A.
Vanstone. Handbook of Applied Cryptography, CRC Press, Boca Raton, FL, 1997
|