# | Title | Author | Publisher | Category | JKU Bib Reference | Win Bib Reference | Status | Borrower |
---|---|---|---|---|---|---|---|---|
1 | Introduction to Chinese, Japanese and Korean Computing (Series in Computer Science) (Series in Computer Science) | Jack K. T. Huang, Timothy D. Huang | World Scientific Pub Co Inc | Grundlagen der Informatik | Win.a.209 | 0.155 |
Available |
No One |
2 | Mikrosimulation eines dezentral- selbstorganisierenden Verkehrsbeeinflussungssystems mit Digitalen Pheromonen | Gunter Sturmberger | JKU | Diplomarbeiten / Masterarbeit | nan | 19.207 |
Available |
No One |
3 | Designing and Coding Reusable C++ | Martin D. Carroll, Margaret A. Ellis | Addison-Wesley Professional | Programmiersprachen | Win.h.1199 | 2.274 |
Available |
No One |
4 | More Exceptional C++: 40 New Engineering Puzzles, Programming Problems, and Solutions (C++ In-Depth Series) | Herb Sutter | Addison-Wesley Professional | Programmiersprachen | Win.h.1177 | 2.260 |
Available |
No One |
5 | Programming in Dylan | Iain D. Craig | Springer-Verlag GmbH | Programmiersprachen | Win.b.303 | 2.275 |
Available |
No One |
6 | Dylan Programming: An Object-Oriented and Dynamic Language | Sonya E. Keene, Robert O. Mathews, P. Tucker Withington, robert Mathews | Addison Wesley Longman | Programmiersprachen | Win.b.304 | 2.277 |
Available |
No One |
7 | Effective STL: 50 Specific Ways to Improve Your Use of the Standard Template Library (Addison-Wesley Professional Computing Series) | Scott Meyers | Addison-Wesley Professional | Programmiersprachen | Win.h.1175 | 2.259 |
Available |
No One |
8 | MySQL Stored Procedure Programming | Guy Harrison, Steven Feuerstein | O'Reilly Media, Inc. | Datenbanken | Win.h.1174 | 6.059 |
Available |
No One |
9 | NetBeans Platform 6 - Rich-Client-Entwicklung mit Java | Heiko Böck | Galileo Press | Angewandte Informatik | Win.h.1172 | 12.061 |
Available |
No One |
10 | High Performance MySQL. Optimierung, Datensicherung, Replikation & Lastverteilung | Jeremy D. Zawodny, Derek J. Balling | O'Reilly | Grundlagen der Informatik | Win.h.1171 | 0.151 |
Available |
No One |
11 | MySQL Database Design and Tuning (Developer's Library) | Robert D Schneider | MySQL Press | Datenbanken | Win.d.744 | 6.060 |
Available |
No One |
12 | Prototype and script.aculo.us: You Never Knew JavaScript Could Do This! | Christophe Porteneuve | Pragmatic Bookshelf | Sonstiges | Win.h.1185 | 18.156 |
Available |
No One |
13 | Algorithmik. Die Kunst des Rechnens: Die Kunst DES Rechnens | David Harel, Yishai Feldman | Springer, Berlin | Grundlagen der Informatik | Win.a.201 | 0.147 |
Borrowed |
Johannes Sametinger |
14 | C++ GUI Programming with Qt 4 | Jasmin Blanchette, Mark Summerfield | Prentice Hall PTR | Angewandte Informatik | Win.b.286 | 12.059 |
Available |
No One |
15 | The Book of Qt 4: The Art of Building Qt Applications | Daniel Molkentin | No Starch Press | Angewandte Informatik | Win.d.741 | 12.060 |
Available |
No One |
16 | Ruby for Rails: Ruby Techniques for Rails Developers | David Black | Manning Publications | Programmiersprachen | Win.b.283 | 2.257 |
Available |
No One |
17 | Effective C++: 55 Specific Ways to Improve Your Programs and Designs (3rd Edition) (Addison-Wesley Professional Computing Series) | Scott Meyers | Addison-Wesley Professional | Programmiersprachen | Win.b.284 | 2.255 |
Available |
No One |
18 | More Effective C++: 35 New Ways to Improve Your Programs and Designs (Addison-Wesley Professional Computing Series) | Scott Meyers | Addison-Wesley Professional | Programmiersprachen | Win.b.285 | 2.256 |
Available |
No One |
19 | Core JavaServer(TM) Faces (2nd Edition) (Core Series) | David Geary, Cay S. Horstmann | Prentice Hall PTR | Grundlagen der Informatik | Win.h.1162 | 0.140 |
Available |
No One |
20 | Security Log Management. Identifying Patterns in the Chaos | Jacob Babbin | Syngress Media | Grundlagen der Informatik | Win.h.1168 | 0.148 |
Available |
No One |
21 | Security Engineering with Patterns. Origins, Theoretical Models, and New Applications.: Origins, Theoretical Models, and New Applications | Markus Schumacher | Springer, Berlin | Grundlagen der Informatik | Win.h.1165 | 0.137 |
Borrowed |
Johannes Sametinger |
22 | Web Service Security: Scenarios, Patterns, and Implementation Guidance for Web Services Enhancements (WSE) 3.0 (Patterns & Practices) | Microsoft Corporation | Microsoft Press | Grundlagen der Informatik | Win.h.1167 | 0.150 |
Available |
No One |
23 | Core Security Patterns: Best Practices and Strategies for J2EE(TM), Web Services, and Identity Management (Core Series) | Christopher Steel, Ramesh Nagappan, Ray Lai | Prentice Hall PTR | Grundlagen der Informatik | Win.h.1163 | 0.146 |
Available |
No One |
24 | Security Patterns. Integrating Security and Systems Engineering (Wiley Series in Software Design Patterns) | Markus Schumacher, Eduardo Fernandez-Buglioni, Duane Hybertson, Frank Buschmann, Peter Sommerlad | Wiley & Sons | Grundlagen der Informatik | Win.h.1164 | 0.136 |
Available |
No One |
25 | Thinking in C++, Vol. 2: Practical Programming, Second Edition | Bruce Eckel, Chuck Allison | Prentice Hall | Grundlagen der Informatik | Win.b.275/2 | 0.135 |
Available |
No One |
26 | Thinking in C++, Volume 1: Introduction to Standard C++ (2nd Edition) | Bruce Eckel | Prentice Hall | Grundlagen der Informatik | Win.b.275/1 | 0.139 |
Available |
No One |
27 | C++ Template Metaprogramming: Concepts, Tools, and Techniques from Boost and Beyond (C++ In-Depth Series) | David Abrahams, Aleksey Gurtovoy | Addison-Wesley Professional | Programmiersprachen | Win.b.276 | 2.258 |
Available |
No One |
28 | Beyond the C++ Standard Library. An Introduction to Boost | Björn Karlsson | Addison-Wesley Longman, Amsterdam | Programmiersprachen | win.b.281 | 2.254 |
Available |
No One |
29 | Trust and Security in Collaborative Computing (Computer and Network Security) | Xukai Zou, Yuan-shun Dai | World Scientific Publishing Company | Grundlagen der Informatik | Win.h.1184 | 0.154 |
Available |
No One |
30 | Security in Distributed and Networking Systems (Computer and Network Security) | Yang Xiao | World Scientific Publishing Company | Grundlagen der Informatik | Win.h.1166 | 0.138 |
Borrowed |
Johannes Sametinger |
31 | Risks, Controls, and Security : Concepts and Applications | Vasant Raval, Ashok Fichadia | Wiley | Grundlagen der Informatik | Win.i.280 | 0.133 |
Borrowed |
Johannes Sametinger |
32 | Computer Forensics : Incident Response Essentials | Warren G. Kruse II, Jay G. Heiser | Addison-Wesley Professional | Grundlagen der Informatik | win.i.279 | 0.134 |
Available |
No One |
33 | The Art of Software Security Testing: Identifying Software Security Flaws (Symantec Press) | Chris Wysopal, Lucas Nelson, Dino Dai Zovi, Elfriede Dustin | Addison-Wesley Professional | Grundlagen der Informatik | Win.h.1161 | 0.143 |
Available |
No One |
34 | Security Metrics: Replacing Fear, Uncertainty, and Doubt | Andrew Jaquith | Addison-Wesley Professional | Grundlagen der Informatik | Win.h.1159 | 0.141 |
Borrowed |
Johannes Sametinger |
35 | Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI | Debra S. Herrmann | AUERBACH | Grundlagen der Informatik | Win.h.1169 | 0.149 |
Available |
No One |
36 | The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities | Mark Dowd, John McDonald, Justin Schuh | Addison-Wesley Professional | Grundlagen der Informatik | Win.h.1160 | 0.142 |
Borrowed |
Johannes Sametinger |
37 | Hunting Security Bugs | Tom Gallagher, Lawrence Landauer, Bryan Jeffries | Microsoft Press | Grundlagen der Informatik | Win.h.1158 | 0.145 |
Available |
No One |
38 | The Security Development Lifecycle | Michael Howard, Steve Lipner | Microsoft Press | Grundlagen der Informatik | Win.h.1157 | 0.144 |
Available |
No One |
39 | Building Secure Software: How to Avoid Security Problems the Right Way | John Viega, Gary McGraw | Addison-Wesley Professional | Software Engineering | Win.h.1154 | 8.634 |
Available |
No One |
40 | Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation and More | John Viega, Matt Messier | O'Reilly Media, Inc. | Software Engineering | Win.h.1156 | 8.635 |
Available |
No One |
41 | Threat Modeling (Microsoft Professional) | Frank Swiderski, Window Snyder | Microsoft Press | Grundlagen der Informatik | win.h.1135 | 0.131 |
Available |
No One |
42 | Project Scheduling: Recent Models, Algorithms and Applications (International Series in Operations Research & Management Science) | Jan Weglarz | Springer | Grundlagen der Informatik | Win.h.1145 | 0.130 |
Available |
No One |
43 | Secure Coding: Principles and Practices | Mark G. Graff, Kenneth R. Van Wyk | O'Reilly Media, Inc. | Grundlagen der Informatik | Win.h.1198 | 0.161 |
Available |
No One |
44 | Exploiting Online Games: Cheating Massively Distributed Systems (Addison-Wesley Software Security Series) | Greg Hoglund, Gary McGraw | Addison-Wesley Professional | Software Engineering | Win.h.1189 | 8.644 |
Available |
No One |
45 | Modern Compiler Design | D. Grune, H. Bal, C. Jacobs, K. Langendoen | Wiley | Compilerbau | Win.b.296 | 4.021 |
Available |
No One |
46 | Modern Compiler Implementation in Java | Andrew W. Appel, Jens Palsberg | Cambridge University Press | Compilerbau | Win.h.1151 | 4.020 |
Available |
No One |
47 | Modern Compiler Implementation in ML | Andrew W. Appel | Cambridge University Press | Grundlagen der Informatik | Win.h.1152 | 0.132 |
Available |
No One |
48 | Secure Systems Development with UML | Jan Jürjens | Springer | Software Engineering | Win.h.1149 | 8.633 |
Available |
No One |
49 | Plattformen für mobile Java Agenten, Grundlagen, Konzepte, Standards und Ansätze | Andreas Riener, Gerhard Strack | a!apress | Diplomarbeiten / Masterarbeit | nan | 19.206 |
Available |
No One |
50 | SOA Principles of Service Design | Thomas Erl | Prentice Hall | Grundlagen der Informatik | Win.h.1146 | 0.129 |
Borrowed |
Rainer Weinreich |
First | previous | next | last » |