Admin
دانلود کتاب | کتاب مرجع | کتاب انگلیسی | download free book | سری: ۴۱۶۵
نظر دهید ۱۲ مهر ۱۳۹۴

برای دانلود کتاب اینجا کلیک کنیدIdTitleAuthorDatePublisher1Numerical MathematicsDaniel Kressner2008Springer2Object Relationship Notation (ORN) for Database Applications: Enhancing the Modeling and Implementation of AssociationsBryon K. Ehlmann (auth.)2009Springer US3Optical Communication Theory and TechniquesJosef Kallrath, Josef Kallrath, Panos M. Pardalos, Steffen Rebennack, Max Scheidt2005Springer4Optimization In The Energy Industry—2009Springer5Origins and Foundations of Computing: In Cooperation with Heinz Nixdorf MuseumsForumFriedrich L. Bauer (auth.)2010Springer-Verlag Berlin Heidelberg6Partial Differential Equations in Action: From Modelling to TheorySandro Salsa2008Springer7Partial Differential Equations in Action From Modelling to TheoryStig Larsson, Vidar Thomee2008Springer8Partial Differential Equations With Numerical MethodsStig Larsson, Vidar Thomée (auth.)2003Springer-Verlag Berlin Heidelberg9Object-Oriented Programming and JavaDanny Poo, Derek Kiong, Swarnalatha Ashok2007Springer10Practical Optimization Methods: With Mathematica ApplicationsIgor Rychlik, Jesper Rydén2000Springer11Probability and Risk Analysis: An Introduction for EngineersBenoît Codrons2006Springer12Questions of Modern Cosmology: Galileo s LegacyMauro D’Onofrio, Carlo Burigana (auth.), Mauro D Onofrio, Carlo Burigana (eds.)2009Springer-Verlag Berlin Heidelberg13Queueing Theory With Applications To Packet Telecommunication—2005Springer14Real-Time And Embedded Computing SystemsMircea Gh. Negoita, Bernd Reusch2004Springer15Reverse Engineering – An Industrial Perspective—2008Springer16Rocket Spacecraft Propulsion – Principles, Practice and new Developments—2006Springer17Roncoroni Implementing Models in Quantitative Finance – Methods and Cases—2008Springer18Satellite communications and navigation systems—2008Springer19Security Engineering For Service-Oriented ArchitecturesPim Tuyls, Boris Skoric, Tom Kevenaar2008Springer20Security with Noisy Data – On Private Biometrics, Secure Key Storage and Anti-CounterfeitingJacques Janssen, Raimondo Manca2007Springer21Semi-Markov Risk Models for Finance, Insurance and ReliabilityDavid Makinson2007Springer22Sets, Logic and Maths for ComputingDavid Makinson (auth.)2008Springer London23Software Product Management And Pricing – Key Success Factors for Software OrganizationsHans-Bernd Kittlaus, Peter N. Clough2009Springer24Handbook of Nanotechnology—2004Spri

مطالب مرتبط
دیدگاه ها بدون دیدگاه

دیدگاهی برای این مطلب ارسال نشده است.

پاسخ دهید

پاسخ دهید

نشانی ایمیل شما منتشر نخواهد شد.