 | Harold
Abelson, Gerald Jay Sussman, and Jullie
Sussman.
Structure and
Interpretation of Computer Programs.
MIT Press, Cambridge, MA, 1985. |
 | Max K.
Agoston.
Computer
Graphics and Geometric Modeling: Implementation and Algorithms.
Springer Verlag, 2005. |
 | Max K.
Agoston.
Computer
Graphics and Geometric Modeling: Mathematics.
Springer Verlag, 2005. |
 | Alfred V.
Aho, John E. Hopcroft, and Jeffrey D. Ullman.
The Design and
Analysis of Computer Algorithms.
Addison-Wesley, Reading, MA, 1974. |
 | Alfred V.
Aho, Ravi Sethi, and Jeffrey D. Ullman.
Compilers,
Principles, Techniques, and Tools.
Addison-Wesley, Reading, MA, 1985. |
 | Christopher
Alexander.
Notes on the
Synthesis of Form.
Harvard University Press, Cambridge, 1964. |
 | Christopher
Alexander.
The Timeless
Way of Building.
Oxford University Press, New York, 1979. |
 | Christopher
Alexander.
The Nature of
Order.
Oxford University Press, Oxford, 2001. |
| B.J.
Allen-Conn and Kim Rose.
Powerful Ideas in the Classroom: Using Squeak to Enhance Math and
Science Learning.
Viewpoints Research Institute, Inc., Glendale, California, 2003. |
 | Scott W. Ambler.
The Elements of
UML 2.0 Style.
Cambridge University Press, Cambridge, 2005. |
 | Ross Anderson.
Security
Engineering: A Guide to Building Dependable Distributed Systems.
Wiley, New York, 2001. |
| Michael A. Arbib.
Brains, Machines, and Mathematics.
McGraw-Hill, 1963. |
 | Ken
Arnold and James Gosling.
The Java
Programming Language.
Addison-Wesley, 1996. |
| Robert L.
Ashenhurst, editor.
ACM Turing
Award lectures.
Addison-Wesley, 1987. |
 | Bruno
Aziza and Joey Fitts.
Drive Business
Performance: Enabling a Culture of Intelligent Execution.
John Wiley & Sons, New York, 2008. |
| Maurice J. Bach.
The Design of
the UNIX Operating System.
Prentice Hall, Englewood Cliffs, NJ, 1986. |
 | Friedrich L.
Bauer.
Decrypted
Secrets: Methods and Maxims of Cryptology.
Springer Verlag, 1997. |
 | Kent Beck.
Extreme
Programming Explained: Embrace Change.
Addison-Wesley, Boston, MA, 2000. |
 | Kent Beck.
Implementation
Patterns.
Addison-Wesley, Boston, MA, 2007. |
 | Kris Macleod
Bell, Lars Ivar Igesund, Sean Kelly, and
Michael Parker.
Learn to
Tango with D.
Apress, Berkeley, CA, 2007. |
 | M. Ben-Ari.
Principles of
Concurrent and Distributed Programming.
Prentice Hall, Englewood Cliffs, NJ, 1990. |
| Jon Louis
Bentley.
Writing
Efficient Programs.
Prentice Hall, Englewood Cliffs, NJ, 1982. |
 | Jon Louis
Bentley.
Programming
Pearls.
Addison-Wesley, Reading, MA, 1986. |
 | Jon Louis
Bentley.
More
Programming Pearls: Confessions of a Coder.
Addison-Wesley, Reading, MA, 1988. |
 | Peter L.
Bernstein.
Against the
Gods: The Remarkable Story of Risk.
John Wiley & Sons, New York, 1996. |
| G. B. Bleazard.
Handbook of
Data Communications.
NCC Publications, The National Computing Centre Limited, Oxford Road,
Manchester M1 7ED, England, 1986. |
 | Joshua T. Bloch.
Effective
Java.
Addison-Wesley, Boston, MA, second edition, 2008. |
 | Grady
Booch, James Rumbaugh, and Ivar Jacobson.
The Unified
Modeling Language User Guide.
Addison-Wesley, Reading, MA, 1999. |
 | Paul Booth.
An Introduction
to Human-Computer Interaction.
Lawrence Erlbaum Associates, Publishers, New Jersey, NJ, 1989. |
 | L. Bostock and S. Chandler.
Pure
Mathematics.
Stanley Thorner (Publishers) Ltd., 1978. |
 | F. P. Brooks.
The Mythical
Man Month.
Addison-Wesley, Reading, MA, 1975. |
 | J. Glenn
Brookshear.
Computer
Science.
Addison-Wesley, sixth edition, 2000. |
 | J. Glenn
Brookshear.
Computer
Science.
Addison-Wesley, eighth edition, 2004. |
| Ralf Brown
and Jim Kyle.
PC
Interrupts: A Programmer's Reference to BIOS, DOS, and Third-party
Calls.
Addison-Wesley, 1991. |
| William J.
Brown, Raphael C. Malveau, Hays W. McCormick
III, and Thomas J. Mowbray.
AntiPatterns
Refactoring Software, Architectures, and Projects in Crisis.
Wiley, New York, 1998. |
| Bill P.
Buckles and Frederck E. Petry, editors.
Genetic
Algorithms.
IEEE Computer Society Press, 1992. |
 | Peter
Burger and Duncan Gillies.
Interactive
Computer Graphics: Functional, Procedural and Device-level
Methods.
Addison-Wesley, 1989. |
 | Van Burnham.
Supercade: A
Visual History of the Videogame Age 1971–1984.
MIT Press, Cambridge, MA, 2001. |
 | Stuart K.
Card, Thomas P. Moran, and Allen Newell.
The Psychology
of Human-Computer Interaction.
Lawrence Erlbaum Associates, Publishers, New Jersey, 1983. |
 | Christopher
Chatfield.
Statistics for
Technology: A Course in Applied Statistics.
Chapman and Hall, 1983. |
| Keith L.
Clark and Frank G. McCabe.
micro-PROLOG:
Programming in Logic.
Prentice Hall, Englewood Cliffs, NJ, 1984. |
 | Daniel I. A.
Cohen.
Introduction to
Computer Theory.
John Wiley & Sons, New York, 1997. |
 | Douglas E. Comer and David L.
Stevens.
Internetworking
with TCP/IP, volume II: Design, Implementation and Internals.
Prentice Hall, Englewood Cliffs, NJ, 1991. |
 | Douglas E. Comer and David L.
Stevens.
Internetworking
with TCP/IP, volume III: Client-Server Programming and
Applications (BSD Socket Version).
Prentice Hall, Englewood Cliffs, NJ, 1993. |
 | Douglas E. Comer.
Internetworking
with TCP/IP, volume I: Principles, Protocols and Architecture.
Prentice Hall, Englewood Cliffs, NJ, second edition, 1991. |
 | Damian Conway.
Object Oriented
Perl.
Manning Publications Co., Greenwich, CT, 2000. |
 | Damian Conway.
Perl Best
Practices.
O'Reilly and Associates, Sebastopol, CA, 2005. |
 | Claire Kehrwald
Cook.
Line by
Line.
Houghton Mifflin, Boston, MA, 1986. |
 | James O. Coplien and
Douglas C. Schmidt.
Pattern
Languages of Program Design.
Addison-Wesley, Reading, MA, 1995. |
| Intel
Corporation.
iAPX 86, 88 User's Manual.
Intel Corporation, 1981. |
| Intel
Corporation.
i486 Processor
Programmer's Reference Manual.
McGraw-Hill, 1990. |
| Microsoft
Corporation.
Microsoft
Windows multimedia programmer's reference.
Microsoft Press, Redmond, WA, 1991. |
| Intel
Corporation.
Intel
architecture software developer's manual, volume 1: Basic
architecture.
Intel Corporation, 1999.
Available online http://www.intel.com/design/PentiumII/manuals/243190.htm. |
| Intel
Corporation.
Intel
architecture software developer's manual, volume 2: Instruction
set reference manual.
Intel Corporation, 1999.
Available online http://www.intel.com/design/PentiumII/manuals/243190.htm. |
| Intel
Corporation.
Intel
architecture software developer's manual, volume 3: System
programming.
Intel Corporation, 1999.
Available online http://www.intel.com/design/PentiumII/manuals/243190.htm. |
| Intel
Corporation.
Intel Pentium 4 and Intel Xeon Processor Optimization: Reference
Manual.
Intel Corporation, 2002. |
| Brad J. Cox.
Object Oriented
Programming: An Evolutionary Approach.
Addison-Wesley, 1986. |
 | Dave Crane,
Eric Pascarello, and Darren James.
Ajax in
Action.
Manning, Greenwich, CT, 2006. |
| Margaret
Cunningham.
File Structure
and Design.
Chartwell-Bratt, 1985. |
| Michael A. Cusumano and
Richard W. Selby.
Microsoft
Secrets.
The Free Press, New York, 1995. |
 | Michael A.
Cusumano.
The Business of
Software: What Every Manager, Programmer, and Entrepreneur Must Know to
Thrive and Survive in Good Times and Bad.
The Free Press, New York, 2004. |
 | Peter Daniel,
editor.
16th
International Conference on Computer Safety, Reliability and Security:
SAFECOMP '97. European Workshop on Industrial Computer Systems:
TC-7, Springer Verlag, September 1997. |
| Tina
Darmohray, editor.
Job
Descriptions for System Administrators.
Short Topics in System Administration. USENIX Association, Berkeley, CA,
1997. |
 | Alan M. Davis.
201 Principles
of Software Development.
McGraw-Hill, 1995. |
 | Fadi P.
Deek and James A. M. McHugh.
Open Source:
Technology and Policy.
Cambridge University Press, Cambridge, 2008. |
 | Tom
DeMarco and Timothy R. Lister.
Peopleware:
Productive Projects and Teams.
Dorset House Publishing, 1987. |
 | Peter J. Denning and Robert M.
Metcalfe, editors.
Beyond
Calculation: The Next Fifty Years of Computing.
Springer Verlag, 1997. |
| Dorothy
Elizabeth Robling Denning.
Cryptography
and Data Security.
Addison-Wesley, Reading, MA, 1983. |
 | Peter J.
Denning.
Computers Under
Attack: Intruders, Worms, and Viruses.
Addison-Wesley, 1990. |
 | Peter J.
Denning, editor.
Talking Back to
the Machine.
Springer Verlag, 1999. |
 | Nachum Dershowitz and
Edward M. Reingold.
Calendrical
Calculations.
Cambridge University Press, Cambridge, 1997. |
| Dimitris K. Despotis and
Constantin Zopounidis, editors.
Proceedings of the 5th International Conference of the Decision Sciences
Institute, DSI '99. Decision Sciences Institute, July 1999. |
| Giorgos Diakonikolaou,
Athanasia Agiakatsika, and Ilias Mpouras.
Corporate
Internetworking.
Kleidarithmos, Athens, Greece, 2004.
In Greek. |
| Barbara L.
Dijker, editor.
A Guide to
Developing Computing Policy Documents.
Short Topics in System Administration. USENIX Association, Berkeley, CA,
1997. |
| Tony Dowden.
Inside the
EISA Computers.
Addison-Wesley, 1990. |
 | William Dunham.
The
Mathematical Universe.
John Wiley & Sons, New York, 1994. |
 | Margaret A. Ellis and Bjarne
Stroustrup.
The Annotated
C++ Reference Manual.
Addison-Wesley, Reading, MA, 1990. |
| Terry
Escamilla.
Intrusion
Detection: Network Security Beyond the Firewall.
Wiley, New York, 1998. |
 | Brian D.
Eubanks.
Wicked Cool
Java: Code Bits, Open-Source Libraries, and Project Ideas.
No Starch Press, San Francisco, 2006. |
 | European UNIX systems User
Group.
10th
Anniversary Conference Proceedings: UNIX around the World, April
1988. |
| European UNIX systems User
Group.
Autumn 1988
Conference Proceedings: New Directions for UNIX, October
1988. |
| European UNIX systems User Group.
Autumn '89
Conference Proceedings, September 1989. |
 | Jim
Farley, William Crawford, and David Flanagan.
Java Enterprise
in a Nutshell.
O'Reilly and Associates, Sebastopol, CA, second edition, 2002. |
 | Michael
Feathers.
Working
Effectively with Legacy Code.
Prentice Hall, Englewood Cliffs, NJ, 2005. |
| Anthony J. Field and Peter G.
Harrison.
Functional
Programming.
Addison-Wesley, 1988. |
| Simone Fisher-Hübner,
Gerald Quirchmayr, and Louise Yngström,
editors.
User Identification & Privacy Protection: Applications in Public
Administration & Electronic Commerce. IFIP WG 8.5 and WS 9.6, June
1999. |
 | David Flanagan.
Java in a
Nutshell.
O'Reilly and Associates, Sebastopol, CA, 1997. |
 | Tom
Forester and Perry Morrison.
Computer
Ethics: Cautionary Tales and Ethical Dilemmas in Computing.
MIT Press, Cambridge, MA, 1990. |
 | Martin
Fowler and Kendall Scott.
UML
Distilled: Applying the Standard Object Modeling Language.
Addison-Wesley, Boston, MA, second edition, 2000. |
 | Martin Fowler.
Refactoring:
Improving the Design of Existing Code.
Addison-Wesley, Boston, MA, 2000. |
 | Martin Fowler.
Domain-Specific
Languages.
Addison-Wesley, Boston, MA, 2010. |
 | Mark
Frauenfelder.
The Best of
Make.
O'Reilly, Sebastopol, CA, 2007. |
| Robert Fulghum.
All I Really Need to Know I Learned in Kindergarten: Uncommon Thoughts on
Common Things.
Ivy Books, reissue edition, 1993. |
 | Carl C. Gaither and Alma E.
Cavazos-Gaither.
Mathematically
Speaking: A Dictionary Quotations.
Institute of Physics Publishing, Bristol and Philadelphia, 1998. |
 | Carl C. Gaither and Alma E.
Cavazos-Gaither, editors.
Practically
Speaking: A Dictionary of Quotations on Engineering, Technology and
Architecture.
Institute of Physics Publishing, Bristol and Philadelphia, 1999. |
 | Erich
Gamma and Kent Beck.
Contributing to
Eclipse: Principles, Patterns, and Plug-Ins.
Addison-Wesley, Boston, MA, 2004. |
 | Erich
Gamma, Richard Helm, Ralph Johnson, and
John Vlissides.
Design
Patterns: Elements of Reusable Object-Oriented Software.
Addison-Wesley, Reading, MA, 1995. |
 | Narain Gehani.
Document
Formatting and Typesetting on the UNIX System.
Silicon Press, Summit, NJ, second edition, 1987. |
 | Narain Gehani.
Bell Labs: Life
in the Crown Jewel.
Silicon Press, Summit, NJ, 2003. |
 | Andrew S.
Glassner.
Graphics
Gems.
Academic Press, 1990. |
 | Adele
Goldberg and David Robson.
Smalltalk-80:
The Language.
Addison-Wesley, Reading, MA, 1989. |
 | Dieter
Gollmann.
Computer
Security.
Wiley, Chichester, UK, 1999. |
 | Pete Goodlife.
Code Craft: The
Practice of Writing Excellent Code.
No Starch Press, San Francisco, 2007. |
| Michael
Gosney, John Odam, and Jim Benson.
The Gray Book:
Designing in Black & White on your Computer.
Vantana Press, second edition, 1990. |
 | Paul Graham.
Hackers &
Painters: Big Ideas from the Computer Age.
O'Reilly and Associates, Sebastopol, CA, 2004. |
| Paul R.
Gray and Robert G. Meyer.
Analysis and
Design of Analog Integrated Circuits.
John Wiley and Sons, New York, second edition, 1984. |
 | John Grimond.
The Economist
Style Guide.
Profile Books, London, 2010. |
| Stefanos
Gritzalis, Sokratis Katsikas, and Dimitris
Gritzalis.
Computer
Network Security.
Papasotiriou, Athens, Greece, 2003.
In Greek. |
| Dimitris
Gritzalis, editor.
IFIP TC5
WG5.4 3rd International Conference on Reliability, Quality & Safety of
Software-Intensive Systems, ENCRESS '97. IFIP, Chapman & Hall,
May 1997. |
| Stefanos
Gritzalis.
Information Systems Security in a Distributed Environment.
PhD thesis, University of Athens, Athens, Greece, 1998.
In Greek. |
 | Mikell P.
Groover.
Automation,
Production Systems, and Computer Integrated Manufacturing.
Prentice Hall, Englewood Cliffs, NJ, 1987. |
| John Grossman,
editor.
The Chicago
Manual of Style.
The University of Chicago Press, Chicago and London, fourteenth edition,
1993. |
 | Wulfram Grstner and Werner
Kistler.
Spiking Neuron
Models: Single Neurons, Populations, Plasticity.
Cambridge University Press, Cambridge, 2002. |
 | Jürg
Gutknecht, editor.
Programming
Languages and System Architectures International Conference.
Springer-Verlag, March 1994.
Lecture Notes in Computer Science 782. |
| Geoff Halprin,
editor.
A System
Administrator's Guide to Auditing.
Short Topics in System Administration. USENIX Association, Berkeley, CA,
2000. |
 | Fred Halsall.
Data
Communications, Computer Networks and OSI.
Addison-Wesley, second edition, 1988. |
| Samuel P. Harbison and Guy L.
Steele Jr.
C: A
Reference Manual.
Prentice Hall, Englewood Cliffs, NJ, third edition, 1991. |
 | David Harel.
Algorithmics:
the Spirit of Computing.
Addison-Wesley, 1987. |
 | Elliotte Rusty Harold and
W. Scott Means.
XML in a
Nutshell.
O'Reilly and Associates, Sebastopol, CA, 2001. |
 | Robert Harris.
Enigma.
Ballantine Books, Beverly Hills, CA, 1996. |
 | Stephen W.
Hawking.
A Brief History
of Time: from the Big Bang to the Black Holes.
Bantam Press, 1988. |
 | John L. Hennessy and David A.
Patterson.
Computer
Architecture: A Quantitative Approach.
Morgan Kaufmann, San Francisco, 1990. |
 | Kevlin Henney,
editor.
97 Things Every
Programmer Should Know.
O'Reilly, Sebastopol, CA, 2010. |
 | Jack
Herrington.
PHP Hacks:
Tips & Tools for Creating Dynamic Web Sites.
O'Reilly, Sebastopol, CA, 2005. |
| Rafael
Hirschfeld, editor.
Financial
Cryptography: First International Conference, FC '97. Springer
Verlag, February 1997.
Lecture Notes in Computer Science 1318. |
 | C. A. R. Hoare.
Communicating
Sequential Processes.
Prentice Hall, Englewood Cliffs, NJ, 1985. |
 | Daniel M. Hoffman and David M.
Weiss, editors.
Software
Fundamentals: Collected Papers by David L. Parnas.
Addison-Wesley, Boston, MA, 2001. |
 | Douglas R.
Hofstadter.
Goedel, Escher,
Bach: an Eternal Golden Braid.
Penguin Books, 1979. |
 | Douglas R.
Hofstadter.
Metamagical
Themas: Questing for the Essence of Mind and Pattern.
Penguin Books, 1986. |
| Christopher John
Hogger.
Introduction to
Logic Programming.
Academic Press, 1984. |
 | Paul
Horowitz and Winfield Hill.
The Art of
Electronics.
University Press, second edition, 1989. |
 | Michael
Howard and David LeBlanc.
Writing Secure
Code.
Microsoft Press, Redmond, WA, second edition, 2003. |
 | Paul Hudson.
PHP in a
Nutshell: A Desktop Quick Reference.
O'Reilly, Sebastopol, CA, 2005. |
 | Darrell Huff.
How to Lie with
Statistics.
W. W. Norton & Company, New York, 1954. |
 | Watts S.
Humphrey.
Managing the
Software Process.
Addison-Wesley, Reading, MA, 1989. |
 | Andrew
Hunt and David Thomas.
The Pragmatic
Programmer: From Journeyman to Master.
Addison-Wesley, Boston, MA, 2000. |
| IBM
Corporation.
IBM Personal Computer Technical Reference Manual, 1983. |
 | Adobe Systems Incorporated.
Postscript
Language Reference Manual.
Addison-Wesley, 1985. |
 | Adobe Systems Incorporated.
Postscript
Language Program Design.
Addison-Wesley, 1988. |
 | Michael Jackson.
Software
Requirements & Specifications: a Lexicon of Practice, Principles and
Prejudices.
Addison-Wesley, 1995. |
 | Raj Jain.
The Art of
Computer Systems Performance Analysis.
John Wiley and Sons, New York, 1991. |
 | Michael
Jenkin and Laurence Harris, editors.
Computational
and Psychophysical Mechanisms of Visual Coding.
Cambridge University Press, Cambridge, 1997. |
| Nelson Johnson.
Advanced
Graphics in C: Programming and Techniques.
Osborne McGraw Hill, 1987. |
 | Steven Johnson.
Everything Bad
Is Good for You.
Riverhead Trade, City, 2006. |
 | Aviel
William Strunk Jr. and E. B. White.
The Elements of
Style.
Macmillan Publishing Co., New York, 1979. |
 | David Kahn.
The
Codebreakers: The Story of Secret Writing.
Scribner, New York, 1996. |
 | Stephen H. Kan.
Metrics and
Models in Software Quality Engineering.
Addison-Wesley, Boston, MA, second edition, 2002. |
 | Cem Kaner,
Jack Falk, and Hung Quoc Nguyen.
Testing
Computer Software.
Wiley, New York, second edition, 1999. |
 | Dimitris
Karagiannis, editor.
DEXA 94: 5th
International Conference on Database and Expert Systems
Applications. Springer-Verlag, September 1994.
Lecture Notes in Computer Science 856. |
 | Sokratis K. Katsikas and
Dimitris Gritzalis, editors.
Information
Systems Security: Facing the Information Society of the 21st
Century.
Chapman & Hall, 1996. |
 | Sokratis K. Katsikas, Stefanos
Gritzalis, and Javier Lopez, editors.
Public Key
Infrastructure: First European PKI Workshop: Research and Applications,
EuroPKI 2004. Springer-Verlag, June 2004.
Lecture Notes in Computer Science 3093. |
 | Sokratis
Katsikas, editor.
Proceedings
CMS '97 3rd IFIP TC6/TC11 International joint working Conference on
Communications and Multimedia Security. IFIP, Chapman & Hall,
September 1997. |
 | Simeon
Keates and John Clarkson.
Countering
Design Exclusion: An Introduction to Inclusive Design.
Springer-Verlag, London, 2004. |
 | Brian W. Kernighan and Rob
Pike.
The UNIX
Programming Environment.
Prentice Hall, Englewood Cliffs, NJ, 1984. |
 | Brian W. Kernighan and Rob
Pike.
The Practice of
Programming.
Addison-Wesley, Reading, MA, 1999. |
 | Brian W. Kernighan and P. J.
Plauger.
Software
Tools.
Addison-Wesley, Reading, MA, 1976. |
 | Brian W. Kernighan and P. J.
Plauger.
The Elements of
Programming Style.
McGraw-Hill, New York, second edition, 1978. |
| Brian W. Kernighan and
Dennis M. Ritchie.
The C Programming Language.
Prentice Hall, Englewood Cliffs, NJ, first edition, 1978. |
 | Brian W. Kernighan and
Dennis M. Ritchie.
The C
Programming Language.
Prentice Hall, Englewood Cliffs, NJ, second edition, 1988. |
 | K. N. King.
Java
Programming: from the Beginning.
W. W. Norton & Company, New York, 2000. |
 | Stephen King.
On Writing: A
Memoir of the Craft.
New English Library/Hodder & Stoughton, London, 2001. |
 | Lars Klander.
Hacker Proof:
the Ultimate Guide to Network Security.
Jamsa Press, Las Vegas, NV, 1997. |
 | Elizabeth
Knowles, editor.
The Oxford
Dictionary of Twenthieth Century Quotations.
Oxford University Press, 1998. |
 | Donald E. Knuth.
The Art of
Computer Programming, volume 1: Fundamental Algorithms.
Addison-Wesley, Reading, MA, second edition, 1973. |
 | Donald E. Knuth.
The Art of
Computer Programming, volume 3: Sorting and Searching.
Addison-Wesley, Reading, MA, 1973. |
 | Donald E. Knuth.
The Art of
Computer Programming, volume 2: Seminumerical Algorithms.
Addison-Wesley, Reading, MA, second edition, 1981. |
 | Donald E. Knuth.
The
METAFONTbook.
Addison-Wesley, Reading, MA, 1986. |
 | Donald E. Knuth.
The
TeXbook.
Addison-Wesley, Reading, MA, 1989. |
 | Donald E. Knuth.
Selected Papers
on Computer Science.
Cambridge University Press, Cambridge, 1996.
CSLI Lecture Notes Number 59. |
 | Donald E. Knuth.
The Art of
Computer Programming, volume 1: Fundamental Algorithms.
Addison-Wesley, Reading, MA, third edition, 1997. |
 | Andrew Koenig.
C Traps and
Pitfalls.
Addison-Wesley, Reading, MA, 1988. |
 | Henry F. Korth and Abraham
Silberschatz.
Database System
Concepts.
McGraw-Hill, second edition, 1991. |
| Glenn Krasner.
Smalltalk-80:
Bits of History, Words of Advice.
Addison-Wesley, 1983. |
| Susan Lammers.
Programmers at
Work.
Microsoft Press, Redmond, WA, 1989. |
| Leslie Lamport.
LATEX: A
Document Preparation System.
Adisson-Wesley, Reading, MA, 1985. |
 | Leslie Lamport.
LATEX: A
Document Preparation System.
Adisson-Wesley, Reading, MA, second edition, 1994. |
| Günther
Lamprecht.
Introduction to
SIMULA-67.
Friedr. Vieweg & Sohn, Braunschweig, Wiesbaden, Germany, 1981. |
 | Samuel J.
Leffler, Marshall Kirk McKusick, Michael J.
Karels, and John S. Quarterman.
The Design and
Implementation of the 4.3BSD Unix Operating System.
Addison-Wesley, Boston, MA, 1988. |
| Meir M.
Lehman and Laszlo A. Belady.
Program
Evolution: Processes of Software Change.
Academic Press, 1985. |
| LH
Software.
FESPA for
Windows.
Kleidarithmos, Athens, Greece, 1998.
In Greek. |
 | Don
Libes and Sandy Ressler.
Life with
UNIX.
Prentice Hall, Englewood Cliffs, NJ, 1989. |
 | Don Libes.
Obfuscated C
and Other Mysteries.
John Wiley and Sons, New York, 1993. |
| Spyros P. Libieratos and
Dimitris K. Charamidopoulos.
The Computation
of Space Structures.
Kleidarithmos, Athens, Greece, 1996.
In Greek. |
 | Tim
Lindhorn and Frank Yellin.
The Java
Virtual Machine Specification.
The Java Series. Addison-Wesley, Reading, MA, 1997. |
 | John Lions.
Lions'
Commentary on Unix 6th Edition with Source Code.
Annabooks, Poway, CA, 1996. |
 | Bernice Sacks
Lipkin.
Latex for
Linux: A Vade Mecum.
Springer Verlag, 1999. |
 | Stanley B.
Lippman.
A C++
Primer.
Addison-Wesley, 1989. |
| Spyros Livieratos and Dimitris
Charamidopoulos, editors.
Tekton for Windows.
Klitharithmos, Athens, Greece, 1996.
In Greek. |
 | Christos K. K. Loverdos and
Apostolos Syropoulos.
Steps in
Scala: An Introduction to Object-Functional Programming.
Cambridge University Press, Cambridge, 2010. |
 | Steve Maguire.
Writing solid
code: Microsoft's techniques for developing bug-free programs.
Microsoft Press, Redmond, WA, 1993. |
 | Mary
Manns and Linda Rising.
Fearless
Change.
Twayne Publishers, Boston, 2005. |
 | Joe Marasco.
The Software
Development Edge: Essays on Managing Succesful Projects.
Addison-Wesley, Boston, MA, 2005. |
 | Robert C. Martin.
UML for
Java Programmers.
Prentice Hall, Upper Saddle River, NJ, 2002. |
 | Robert C. Martin.
Agile Software
Development: Principles, Patterns, and Practices.
Prentice Hall, Upper Saddle River, NJ, 2003. |
 | Norman
Matloff and Peter Jay Salzman.
The Art of
Debugging with GDB, DDD, and Eclipse.
No Starch Press, San Francisco, 2008. |
 | Clive ``Max''
Maxfield.
Bebop to the
Boolean Boogie.
Newnes, 2003. |
 | Pete McBreen.
Software
Craftsmanship: The New Imperative.
Addison-Wesley, 2002. |
| Steve C
McConnell.
Code Complete :
A Practical Handbook of Software Construction.
Microsoft Press, Redmond, WA, 1993. |
 | Steve C
McConnell.
Code Complete:
A Practical Handbook of Software Construction.
Microsoft Press, Redmond, WA, second edition, 2004. |
| Andrew D.
McGettrick.
The Definition
of Programming Languages.
Cambridge University Press, 1980. |
| Gary
McGraw and Edward W. Felten.
Securing
Java: Getting Down to Business with Mobile Code.
Wiley, New York, second edition, 1999. |
| Kathryn S.
McKinley, editor.
20 Years of the
ACM SIGPLAN Conference on Programming Language Design and Implementation
1979-1999, A Selection. ACM, 2004. |
 | Marshall Kirk McKusick and
George V. Neville-Neil.
The Design and
Implementation of the FreeBSD Operating System.
Addison-Wesley, Reading, MA, 2004. |
 | David G. Messerschmitt and
Clemens Szyperski.
Software
Ecosystem: Understanding an Indispensable Technology and Industry.
MIT Press, Cambridge, MA, 2004. |
 | Bertrand Meyer.
Object-oriented
Software Construction.
Prentice Hall, Englewood Cliffs, NJ, 1988. |
 | Scott Meyers.
Effective
C++.
Addison-Wesley, Reading, MA, second edition, 1998. |
 | Scott Meyers.
Effective
STL.
Addison-Wesley, Reading, MA, 2001. |
 | Microsoft Corporation.
Microsoft
C# Language Specifications.
Microsoft Press, Redmond, WA, 2001. |
| Robert
Milne and Christopher Strachey.
A Theory of
Programming Language Semantics.
Chapman and Hall, London, UK, 1976. |
 | Trevor
Misfeldt, Gregory Bumgardner, and Andrew Gray.
The Elements of
C++ Style.
Cambridge University Press, Cambridge, 2004. |
| Geoffrey A. Moore.
Crossing the Chasm.
HarperCollins, New York, 1991. |
| Sape
Mullender, editor.
Distributed Systems.
Addison-Wesley, 1989. |
 | Jackie
Neider, Tom Davis, and Mason Woo.
OpenGL
Programming Guide: The Official Guide to Learning OpenGL.
Addison-Wesley, 1993. |
 | Peter G.
Neumann.
Computer
Related Risks.
Addison-Wesley, 1995. |
| Joe
Nickell, Barry Karr, and Tom Genoni, editors.
The Outer Edge: Classic Investigations of the Paranormal.
CSICOP Inc., Amherst, NY, 1996. |
 | Hanne Riis Nielson and
Flemming Nielson.
Semantics with
Applications: An Appetizer.
Springer, 2007. |
 | Donald A. Norman.
The Psychology
of Everyday Things.
BasicBooks, New York, 1988. |
 | Donald A. Norman.
The Invisible
Computer.
MIT Press, Cambridge, MA, 1998. |
 | Beth Simone
Noveck.
Wiki
Government: How Technology Can Make Government Better, Democracy Stronger,
and Citizens More Powerful.
Brookings Institution Press, Washington, D.C., 2009. |
 | Martin
Odersky, Lex Spoon, and Bill Venners.
Programming in
Scala: A Comprehensive Step-by-Step Guide.
Artima, Mountain View, CA, 2009. |
 | Richard A.
O'Keefe.
The Craft of
Prolog.
MIT Press, Cambridge, MA, 1990. |
| David L. Oppenheimer, David A.
Wagner, and Michele D. Crabb.
System
Security: A Management Perspective.
Short Topics in System Administration. USENIX Association, Berkeley, CA,
1997. |
 | Andy Oram
and Greg Wilson.
Beautiful Code:
Leading Programmers Explain How They Think.
O'Reilly and Associates, Sebastopol, CA, 2007. |
 | Andy Oram
and Greg Wilson, editors.
Making
Software: What Really Works, and Why We Believe It.
O'Reilly and Associates, Sebastopol, CA, 2010. |
 | Tim
O'Reilly and Sarah Milstein.
The Twitter
Book.
O'Reilly, Sebastopol, CA, 2009. |
 | John K.
Ousterhout.
Tcl and the
Tk Toolkit.
Addison-Wesley, 1994. |
 | Chrissoleon T. Papadopoulos,
Michael E. J. O'Kelly, Michael J. Vidalis, and
Diomidis Spinellis.
Analysis and
Design of Discrete Part Production Lines.
Springer, 2009.
(doi:10.1007/978-0-387-89494-2_6) |
 | Emil Pascarelli and Deborah
Quilter.
Repetitive
Strain Injury.
John Wiley & Sons, New York, 1994. |
 | Roger Penrose.
The Emperor's
new mind concerning computers, minds and the laws of physics.
Oxford University Press, 1989. |
 | Henry Petroski.
To Engineer is
Human: The Role of Failure in Successful Design.
Vintage Books, New York, 1992. |
| Henry Petroski.
Design
Paradigms: Case Histories of Error and Judgement in Engineering.
Cambridge University Press, Cambridge, 1994. |
 | Henry Petroski.
The Book on the
Bookshelf.
Vintage Books, New York, 1999. |
| Charles Petzold.
Programming
Windows: the Microsoft Guide to Writing Applications for Windows
3.
Microsoft Press, Redmond, WA, second edition, 1990. |
| Simon L.
Peyton Jones.
The
Implementation of Functional Programming Languages.
Prentice Hall, Englewood Cliffs, NJ, 1987. |
 | Charles P. Pfleeger and
Shari Lawrence Pfleeger.
Security in
Computing.
Prentice Hall, Englewood Cliffs, NJ, fourth edition, 2007. |
 | Benjamin C.
Pierce.
Types and
Programming Languages.
MIT Press, Cambridge, MA, 2002. |
| Lewis J.
Pinson and Richard S. Wiener.
An Introduction
to Object-Oriented Programming and Smalltalk.
Addison-Wesley, 1988. |
 | Robert M. Pirsig.
Zen and the Art
of Motorcycle Maintenance.
Vintage, London, 1991.
First published in Great Britain by the Bodley Head, 1974. |
 | P. J. Plauger.
Programming on
Purpose: Essays on Software Design.
Prentice Hall, Englewood Cliffs, NJ, 1993. |
| P. J. Plauger.
Programming on
Purpose II: Essays on Software People.
Prentice Hall, Englewood Cliffs, NJ, 1993. |
| P. J. Plauger.
Programming on
Purpose III: Essays on Software Technology.
Prentice Hall, Englewood Cliffs, NJ, 1994. |
 | David Pogue.
The World
According to Twitter.
Black Dog & Leventhal Publishers, New York, 2009. |
 | Ken C. Pohlman.
The Compact
Disc Handbook.
Oxford University Press, 1992. |
 | Ben
Potter, Jane Sinclair, and David Till.
An Introduction
to Formal Specification and Z.
Prentice Hall, Englewood Cliffs, NJ, 1991. |
 | William H. Press, Brian P.
Flannery, Saul A. Teukolsky, and William T.
Vetterling.
Numerical
Recipes Example Book (C).
Cambridge University Press, 1988. |
 | William H.
Press, Brian P. Flannery, Saul A. Teukolsky,
and William T. Vetterling.
Numerical
Recipes in C.
Cambridge University Press, 1988. |
 | William H.
Press, Saul A. Teukolsky, William T.
Vetterling, and Brian P. Flannery.
Numerical
Recipes in C++.
Cambridge University Press, Cambridge, second edition, 2002. |
 | Roger S.
Pressman.
Software
Engineering: A Practitioner's Approach.
McGraw-Hill, 1987. |
 | Roger S.
Pressman.
Software
Engineering: A Practitioner's Approach.
McGraw-Hill, London, fifth edition, 2000.
European Adaptation. Adapted by Darrel Ince. |
| Dave Radin.
Building a
Successful Software Business.
O'Reilly and Associates, Sebastopol, CA, 1994. |
 | Raghu Ramakrishnan and
Johannes Gehrke.
Database
Management Systems.
McGraw-Hill, second edition, 2000. |
 | Jef Raskin.
The Humane
Interface: New Directions for Designing Interactive Systems.
Addison-Wesley, Boston, MA, 2000. |
 | Eric Raymond.
The New
Hacker's Dictionary.
MIT Press, Cambridge, MA, 1991. |
 | Eric Steven
Raymond.
The Art of
Unix Programming.
Addison-Wesley, 2003. |
 | Casey Read
and Ben Fry.
Processing: A
Programming Handbook for Visual Designers and Artists.
MIT Press, Cambridge, MA, 2007. |
 | David Reed.
A Balanced
Introduction to Computer Science.
Pearson Prentice Hall, Upper Saddle River, NJ, 2005. |
 | Eric Rescorla.
SSL and
TLS.
Addison-Wesley, 2001. |
 | Garr Reynolds.
Presentation
Zen: Simple Ideas on Presentation Design on Presentation Design and
Delivery.
New Riders, Berkeley, CA, 2008. |
 | Charles
Rich and Richard C. Waters, editors.
Readings in
Artifical Intelligence and Software Engineering.
Morgan Kaufmann, San Francisco, 1986. |
 | Elaine Rich.
Artificial
Intelligence.
McGraw-Hill, 1983. |
 | Kay A.
Robbins and Steven Robbins.
UNIX Systems
Programming: Communication, Concurrency, and Threads.
Prentice Hall, Upper Saddle River, NJ, 2003. |
 | Arnold Robbins.
bash Quick
Reference.
O'Reilly Media, Sebastopol, CA, 2006. |
| Marshall T. Rose.
The Open Book:
A Practical Perspective on OSI.
Prentice Hall, Englewood Cliffs, NJ, 1989. |
 | Sheldon M. Ross.
Introduction to
Probability and Statistics for Engineers and Scientists.
Elsevier Academic Press, third edition, 2004. |
 | Aviel D.
Rubin, Daniel Geer, and Marcus J. Ranum.
Web Security
Sourcebook.
John Wiley & Sons, New York, 1997. |
| Steven M. Rubin.
Computer Aids
for VLSI Design.
Addison-Wesley, 1987. |
 | James
Rumbaugh, Michael Blaha, William Premerlani,
Frederick Eddy, and William Lorensen.
Object-Oriented
Modeling and Design.
Prentice Hall, Englewood Cliffs, NJ, 1991. |
 | James
Rumbaugh, Ivar Jacobson, and Grady Booch.
The Unified
Modeling Language Reference Manual.
Addison-Wesley, Reading, MA, 1999. |
 | Thomas P. Ryan.
Modern
Engineering Statistics.
Wiley-Interscience, 2007. |
 | Jerome H. Saltzer and M. Frans
Kaashoek.
Principles of
Computer System Design: An Introduction.
Morgan Kaufmann, San Diego, 2009. |
| Peter H. Salus,
editor.
Handbook of
Programming Languages, volume I: Object-Oriented Programming
Languages.
Macmillan Technical Publishing, Indianapolis, IN, 1998. |
| Peter H. Salus,
editor.
Handbook of
Programming Languages, volume II: Imperative Programming
Languages.
Macmillan Technical Publishing, Indianapolis, IN, 1998. |
| Peter H. Salus,
editor.
Handbook of
Programming Languages, volume III: Little Languages and Tools.
Macmillan Technical Publishing, Indianapolis, IN, 1998. |
| Peter H. Salus,
editor.
Handbook of
Programming Languages, volume IV: Functional and Logic Programming
Languages.
Macmillan Technical Publishing, Indianapolis, IN, 1998. |
| Charles H.
Schmauch.
ISO 9000 for
Software Developers.
ASQC Quality Press, Milwaukee, WI, 1995. |
| David A.
Schmidt.
Denotational
Semantics: A Methodology for Language Development.
Wm. C. Brown, 1986. |
| Bruce Schneier.
Applied
Cryptography.
Wiley, New York, second edition, 1996. |
 | Bruce Schneier.
Secrets &
Lies: Digital Security in a Networked World.
Wiley, New York, 2000. |
 | Bruce Schneier.
Beyond Fear:
Thinking Sensibly about Security in an Uncertain World.
Copernicus Books, New York, 2003. |
| G. I. Schuëller and
P. Kafka, editors.
Proceedings ESREL '99 — The Tenth European Conference on Safety and
Reliability. ESRA, VDI, TUM, A. A. Balkema, September 1999. |
| Norbert Schwarz.
Introduction to
TeX.
Addison-Wesley, 1989. |
 | Robert
Sedgewick.
Algorithms in
C.
Addison-Wesley, Reading, MA, 1990. |
 | John Sellens,
editor.
System and
Network Administration for Higher Reliability.
Short Topics in System Administration. USENIX Association, Berkeley, CA,
2001. |
| Motorola
Semiconductors.
M68000 16/32-Bit Microprocessor Programmer's Reference Manual.
Motorola Semiconductors, fourth edition, 1984. |
| Hemant Sengar.
Security of ublic and IP Telephone Networks: A Security Assessment of
SS7, SIGTRAN and VoIP Protocols.
VMD Verlag Dr. Müller, Saarbrücken, Germany, 2008. |
 | Ravi Sethi.
Programming
Languages: Concepts and Constructs.
Addison-Wesley, Reading, MA, 1989. |
 | Ben
Shneiderman.
Designing the
User Interface: Strategies for Effective
Human-Computer-Interaction.
Addison-Wesley, Boston, MA, third edition, 1998. |
| Michael Shortland and Jane
Gregory.
Communicating
Science: A Handbook.
Longman Scientific & Technical, 1991. |
| Charles H. Sides.
How to Write
and Present Technical Information.
Cambridge University Press, Cambridge, 1991. |
| Bud E.
Smith and Mark T. Johnson.
Programming the
Intel 80386.
Scott, Foresman and Company, 1987. |
| Ian
Sommerville.
Software
Engineering.
Addison-Wesley, third edition, 1989. |
 | Ian
Sommerville.
Software
Engineering.
Addison-Wesley, sixth edition, 2001. |
 | Sulayman K.
Sowe, Ioannis G. Stamelos, and Ioannis
Samoladas, editors.
Emerging Free
and Open Source Software Practices.
IGI Publishing, Hershey, PA, 2007. |
 | Diomidis Spinellis and
Georgios Gousios, editors.
Beautiful
Architecture: Leading Software Engineers Explain How They Think.
O'Reilly, Sebastopol, CA, 2009. |
| Dionysios
Spinellis, editor.
Computer Crimes
Cyber-Terrorism Child Pornography and Financial Crimes: Reports presented to
the Prepapratory Colloquy for the Round Table II of the 17th International
Congress of Penal Law (Beijing 2004). Ant. N. Sakkoulas, April
2003. |
 | Diomidis
Spinellis.
Code Reading:
The Open Source Perspective.
Addison-Wesley, Boston, MA, 2003. |
 | Diomidis
Spinellis, editor.
Cross-Media
Service Delivery, volume 740 of The Kluwer international
series in engineering and computer science.
Kluwer Academic Publishers, Boston, MA, 2003. |
 | Diomidis
Spinellis.
Code Quality:
The Open Source Perspective.
Addison-Wesley, Boston, MA, 2006. |
 | Maureen Sprankle and Jim
Hubbard.
Problem Solving
& Programming Concepts.
Pearson Education, eighth edition, 2009. |
 | Leon
Sterling and Ehud Shapiro.
The Art of
Prolog.
MIT Press, Cambridge, MA, 1986. |
 | W. Richard
Stevens, Bill Fenner, and Andrew M. Rudoff.
UNIX Network
Programming, volume 1.
Pearson Education, 2003. |
 | W. Richard
Stevens.
UNIX Network
Programming.
Prentice Hall, Englewood Cliffs, NJ, 1990. |
 | W. Richard
Stevens.
Advanced
Programming in the UNIX Environment.
Addison-Wesley, 1992. |
 | Clifford Stoll.
The Cuckoo's
Egg: Tracking a Spy Through a Maze of Computer Espionage.
The Bodley Head, London, 1989. |
 | Clifford Stoll.
Silicon Snake
Oil.
Macmillan Publishing Co., 1995. |
 | Thomas Strothotte and Stefan
Schlechtweg.
Non-Photorealistic
Computer Graphics.
Morgan Kaufmann, San Francisco, 2002. |
| Bjarne
Stroustrup.
The C++
Programming Language.
Addison-Wesley, 1986. |
 | Bjarne
Stroustrup.
The C++
Programming Language.
Addison-Wesley, second edition, 1991. |
 | Bjarne
Stroustrup.
The C++
Programming Language.
Addison-Wesley, Reading, MA, third edition, 1997. |
 | Ed Sullivan.
Under Pressure
and On Time.
Microsoft Press, Redmond, WA, 2001. |
 | Herb Sutter and Andrei
Alexandrescu.
C++ Coding
Standards: 101 Rules, Guidelines, and Best Practices.
Addison Wesley, 2004. |
 | Herb Sutter.
Exceptional
C++ Style: 40 New Engineering Puzzles, Programming Problems, and
Solutions.
Addison Wesley, 2004. |
| AT & T, editor.
UNIX System
Readings and Applications, volume II.
Prentice Hall, Englewood Cliffs, NJ, 1987. |
| Andrew S.
Tanenbaum.
Operating
Systems: Design and Implementation.
Prentice Hall, Englewood Cliffs, NJ, 1987. |
 | Andrew S.
Tanenbaum.
Computer
Networks.
Prentice Hall, Englewood Cliffs, NJ, second edition, 1988. |
 | Adrienne
Tannenbaum.
Metadata
Solutions.
Addison-Wesley, 2002. |
 | Kevin Tate.
Sustainable
Software Development.
Addison-Wesley, Boston, MA, 2006. |
 | Paul Teetor.
R
Cookbook.
O'Reilly and Associates, Sebastopol, CA, 2011. |
| R. D. Tennent.
Princliples of
Programming Languages.
Prentice Hall, Englewood Cliffs, NJ, 1981. |
| The Accredited Standard Committee X3,
Information Processing Systems, Technical Committee for Programming Language
C (X3J11).
Rationale for
the ANSI C Programming Language.
Silicon Press, Summit, NJ, 1990. |
 | Edward R. Tufte.
The Visual
Display of Quantitative Information.
Graphics Press, Cheshire, CT, 1983. |
| Efraim
Turban, Jae Lee, David King, and
H. Michael Chung.
Electronic
Commerce: A Managerial Perspective.
Prentice–Hall, Englewood Cliffs, NJ, 2000. |
| James
Turnbull and Jeffrey McCune.
Pro
Puppet.
Apress, Berkeley, CA, 2011. |
| Wladyslaw M. Turski and
Thomas S. E. Maibaum.
The
Specification of Computer Programs.
Addison-Wesley, 1987. |
| University of the Aegean,
Department of Business Administration.
Second International Aegean Conference on the Analysis and Modelling of
Manufacturing Systems, May 1999. |
| Proceedings of the Summer
1988 USENIX Conference. USENIX Association, June 1988. |
 | John R. Vacca.
Intranet
Security.
Charles River Media, Inc., Rockland, MA, 1997. |
 | Arthur
van Hoff, Sami Shaio, and Orca Starbuck.
Hooked on
Java.
Addison-Wesley, 1996. |
| Jan van
Leeuwen, editor.
Computer Science Today: Recent Trends and Developments.
Springer Verlag, 1995.
Lecture Notes in Computer Science 1000. |
 | John
Viega and Gary McGraw.
Building Secure
Software: How to Avoid Security Problems the Right Way.
Addison-Wesley, Boston, MA, 2001. |
 | John Viega.
The Myths of
Security: What the Computer Security Industry Doesn't Want You to
Know.
O'Reilly, Sebastopol, CA, 2009. |
 | Jesse
Vincent, Robert Spier, Dave Rolsky,
Darren Chamberlain, and Richard Foley.
RT
Essentials.
O'Reilly and Associates, Sebastopol, CA, 2005. |
| Mitchell Waite,
editor.
UNIX Papers
for UNIX Developers and Power Users.
Howard W. Sams & Company, 1987. |
| Jeff Walden.
File Formats
for Popular PC Software: A Programmer's Reference.
John Wiley & Sons, New York, 1986. |
| Jeff Walden.
More File
Formats for Popular PC Software: A Programmer's Reference.
John Wiley & Sons, New York, 1987. |
 | Larry
Wall and Randal L. Schwartz.
Programming
Perl.
O'Reilly and Associates, Sebastopol, CA, 1990. |
 | Henry S.
Warren Jr.
Hacker's
Delight.
Addison-Wesley, Boston, MA, 2003. |
 | Damien
Watkins, Mark Hammond, and Brad Abrams.
Programming in
the .NET Environment.
Addison-Wesley, Reading, MA, 2002. |
 | Alan Watt
and Mark Watt.
Advanced
Animation and Rendering Techniques.
Addison-Wesley, Reading, MA, 1992. |
 | Gerald M.
Weinberg.
The Psychology
of Computer Programming.
Dorset House Publishing, New York, silver anniversary edition, 1998. |
 | Joseph
Weizenbaum.
Computer Power
and Human Reason.
Pelican books, 1984. |
 | Brian Chess Jacob
West.
Secure
programming with static analysis.
Addison-Wesley, Boston, MA, 2007. |
 | Michael A.
Williams.
A History of
Computing Technology.
IEEE Computer Society Press, 1997. |
 | Al Williams.
Microcontroller
Projects with Basic Stamps.
R&D Books, 2000. |
 | Niklaus Wirth.
Programming in
Modula-2.
Springer Verlag, third edition, 1985. |
 | Helen Wright.
Introduction to
Scientific Visualization.
Springer, 2007. |
| Louise Yngström and Simone
Fisher-Hübner, editors.
WISE 1: First World Conference on Information Security
Education. IFIP TC11 WG 11.8, June 1999. |
| Edward Yourdon.
Decline & Fall
of the American Programmer.
Prentice Hall, Englewood Cliffs, NJ, 1993. |
 | Edward Yourdon.
Death
March.
Prentice Hall, Englewood Cliffs, NJ, 1997. |
 | Ruixi
Yuan and W. Timothy Strayer.
Virtual Private
Networks: Technologies and Solutions.
Addison-Wesley, 2001. |
 | William Zinsser.
On Writing
Well.
HarperCollins, London, 2006. |
 | Elizabeth
Zwicky, Simon Cooper, and D. Brent Chapman.
Building
Internet Firewalls.
O'Reilly and Associates, Sebastopol, CA, second edition, 2000. |