کتاب های Eric Yu (auth.)
Markets in Profile: Profiting from the Auction Process
James F. Dalton, Robert Bevan Dalton, Eric T. Jones, 2007
Markets in Profile: Profiting from the Auction Process
James F. Dalton, Robert Bevan Dalton, Eric T. Jones, 2007
Mastering Elliott Wave
Glenn Neely, Eric Hall, 1990
Algorithmic number theory. Efficient algorithms
Eric Bach, Jeffrey Shallit, 1996
Algorithmic number theory: Efficient algorithms
Eric Bach, Jeffrey Shallit, 1996
ASP.NET at Work: Building 10 Enterprise Projects
Eric A. Smith, 2002
Insider Threat. Protecting the Enterprise from Sabotage, Spying and Theft
Eric Cole, Sandra Ring, 2006
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
Eric Cole, Sandra Ring, 2006
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
Eric Cole, Sandra Ring, 2006
Digital Performer 4 Ignite!
Eric D. Grebler, 2003
Building A Cisco Wireless Lan
Eric Ouellet, Robert Padjen, Arthur Pfund, 2002
A Developer's Guide to Data Modeling for SQL Server: Covering SQL Server 2005 and 2008
Eric Johnson, Joshua Jones, 2008
A Practical Theory of Programming
Eric C.R. Hehner, 2011
A Programmer's guide to C# 5.0
Eric Gunnerson.
UML for Mere Mortals®
Robert A. Maksimchuk, Eric J. Naiburg, 2004
A Programmer's Guide to C# 5.0
Eric Gunnerson, Nick Wienholt, 2012
A Programmer's Guide to C# 5.0
Eric Gunnerson, Nick Wienholt, 2012
A programmer's introduction to C#
Eric Gunnerson, 2000
A programmer's introduction to C# 2.0
Eric Gunnerson, Nick Wienholt, 2005
A Programmer's Introduction to C# 2.0
Eric Gunnerson, Nick Wienholt, 2005
A Programmer's Introduction to C# 2.0
Eric Gunnerson, Nick Wienholt, 2005
Cyber Adversary Characterization: Auditing the Hacker Mind
Tom Parker, Marcus Sachs, Eric Shaw, Ed Stroz, Matthew G. Devost, 2004
Hackers Beware
Eric Cole, 2002
Hackers Beware. Defending Your Network from the Wiley Hacker
Eric Cole, 2001
