Harold Abelson, Gerald Jay Sussman, and Jullie Sussman. Structure and Interpretation of Computer Programs. MIT Press, Cambridge, MA, 1985. | |
Max K. Agoston. Computer Graphics and Geometric Modeling: Implementation and Algorithms. Springer Verlag, 2005. | |
Max K. Agoston. Computer Graphics and Geometric Modeling: Mathematics. Springer Verlag, 2005. | |
Alfred V. Aho, John E. Hopcroft, and Jeffrey D. Ullman. The Design and Analysis of Computer Algorithms. Addison-Wesley, Reading, MA, 1974. | |
Alfred V. Aho, Ravi Sethi, and Jeffrey D. Ullman. Compilers, Principles, Techniques, and Tools. Addison-Wesley, Reading, MA, 1985. | |
Christopher Alexander. Notes on the Synthesis of Form. Harvard University Press, Cambridge, 1964. | |
Christopher Alexander. The Timeless Way of Building. Oxford University Press, New York, 1979. | |
Christopher Alexander. The Nature of Order. Oxford University Press, Oxford, 2001. | |
B.J. Allen-Conn and Kim Rose. Powerful Ideas in the Classroom: Using Squeak to Enhance Math and Science Learning. Viewpoints Research Institute, Inc., Glendale, California, 2003. | |
Scott W. Ambler. The Elements of UML 2.0 Style. Cambridge University Press, Cambridge, 2005. | |
Ross Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley, New York, 2001. | |
Michael A. Arbib. Brains, Machines, and Mathematics. McGraw-Hill, 1963. | |
Ken Arnold and James Gosling. The Java Programming Language. Addison-Wesley, 1996. | |
Robert L. Ashenhurst, editor. ACM Turing Award lectures. Addison-Wesley, 1987. | |
Bruno Aziza and Joey Fitts. Drive Business Performance: Enabling a Culture of Intelligent Execution. John Wiley & Sons, New York, 2008. | |
Maurice J. Bach. The Design of the UNIX Operating System. Prentice Hall, Englewood Cliffs, NJ, 1986. | |
Friedrich L. Bauer. Decrypted Secrets: Methods and Maxims of Cryptology. Springer Verlag, 1997. | |
Kent Beck. Extreme Programming Explained: Embrace Change. Addison-Wesley, Boston, MA, 2000. | |
Kent Beck. Implementation Patterns. Addison-Wesley, Boston, MA, 2007. | |
Kris Macleod Bell, Lars Ivar Igesund, Sean Kelly, and Michael Parker. Learn to Tango with D. Apress, Berkeley, CA, 2007. | |
M. Ben-Ari. Principles of Concurrent and Distributed Programming. Prentice Hall, Englewood Cliffs, NJ, 1990. | |
Jon Louis Bentley. Writing Efficient Programs. Prentice Hall, Englewood Cliffs, NJ, 1982. | |
Jon Louis Bentley. Programming Pearls. Addison-Wesley, Reading, MA, 1986. | |
Jon Louis Bentley. More Programming Pearls: Confessions of a Coder. Addison-Wesley, Reading, MA, 1988. | |
Peter L. Bernstein. Against the Gods: The Remarkable Story of Risk. John Wiley & Sons, New York, 1996. | |
G. B. Bleazard. Handbook of Data Communications. NCC Publications, The National Computing Centre Limited, Oxford Road, Manchester M1 7ED, England, 1986. | |
Joshua T. Bloch. Effective Java. Addison-Wesley, Boston, MA, second edition, 2008. | |
Grady Booch, James Rumbaugh, and Ivar Jacobson. The Unified Modeling Language User Guide. Addison-Wesley, Reading, MA, 1999. | |
Paul Booth. An Introduction to Human-Computer Interaction. Lawrence Erlbaum Associates, Publishers, New Jersey, NJ, 1989. | |
L. Bostock and S. Chandler. Pure Mathematics. Stanley Thorner (Publishers) Ltd., 1978. | |
F. P. Brooks. The Mythical Man Month. Addison-Wesley, Reading, MA, 1975. | |
J. Glenn Brookshear. Computer Science. Addison-Wesley, sixth edition, 2000. | |
J. Glenn Brookshear. Computer Science. Addison-Wesley, eighth edition, 2004. | |
Ralf Brown and Jim Kyle. PC Interrupts: A Programmer's Reference to BIOS, DOS, and Third-party Calls. Addison-Wesley, 1991. | |
William J. Brown, Raphael C. Malveau, Hays W. McCormick III, and Thomas J. Mowbray. AntiPatterns Refactoring Software, Architectures, and Projects in Crisis. Wiley, New York, 1998. | |
Bill P. Buckles and Frederck E. Petry, editors. Genetic Algorithms. IEEE Computer Society Press, 1992. | |
Peter Burger and Duncan Gillies. Interactive Computer Graphics: Functional, Procedural and Device-level Methods. Addison-Wesley, 1989. | |
Van Burnham. Supercade: A Visual History of the Videogame Age 1971–1984. MIT Press, Cambridge, MA, 2001. | |
Stuart K. Card, Thomas P. Moran, and Allen Newell. The Psychology of Human-Computer Interaction. Lawrence Erlbaum Associates, Publishers, New Jersey, 1983. | |
Christopher Chatfield. Statistics for Technology: A Course in Applied Statistics. Chapman and Hall, 1983. | |
Keith L. Clark and Frank G. McCabe. micro-PROLOG: Programming in Logic. Prentice Hall, Englewood Cliffs, NJ, 1984. | |
Daniel I. A. Cohen. Introduction to Computer Theory. John Wiley & Sons, New York, 1997. | |
Douglas E. Comer and David L. Stevens. Internetworking with TCP/IP, volume II: Design, Implementation and Internals. Prentice Hall, Englewood Cliffs, NJ, 1991. | |
Douglas E. Comer and David L. Stevens. Internetworking with TCP/IP, volume III: Client-Server Programming and Applications (BSD Socket Version). Prentice Hall, Englewood Cliffs, NJ, 1993. | |
Douglas E. Comer. Internetworking with TCP/IP, volume I: Principles, Protocols and Architecture. Prentice Hall, Englewood Cliffs, NJ, second edition, 1991. | |
Damian Conway. Object Oriented Perl. Manning Publications Co., Greenwich, CT, 2000. | |
Damian Conway. Perl Best Practices. O'Reilly and Associates, Sebastopol, CA, 2005. | |
Claire Kehrwald Cook. Line by Line. Houghton Mifflin, Boston, MA, 1986. | |
James O. Coplien and Douglas C. Schmidt. Pattern Languages of Program Design. Addison-Wesley, Reading, MA, 1995. | |
Intel Corporation. iAPX 86, 88 User's Manual. Intel Corporation, 1981. | |
Intel Corporation. i486 Processor Programmer's Reference Manual. McGraw-Hill, 1990. | |
Microsoft Corporation. Microsoft Windows multimedia programmer's reference. Microsoft Press, Redmond, WA, 1991. | |
Intel Corporation. Intel architecture software developer's manual, volume 1: Basic architecture. Intel Corporation, 1999. Available online http://www.intel.com/design/PentiumII/manuals/243190.htm. | |
Intel Corporation. Intel architecture software developer's manual, volume 2: Instruction set reference manual. Intel Corporation, 1999. Available online http://www.intel.com/design/PentiumII/manuals/243190.htm. | |
Intel Corporation. Intel architecture software developer's manual, volume 3: System programming. Intel Corporation, 1999. Available online http://www.intel.com/design/PentiumII/manuals/243190.htm. | |
Intel Corporation. Intel Pentium 4 and Intel Xeon Processor Optimization: Reference Manual. Intel Corporation, 2002. | |
Brad J. Cox. Object Oriented Programming: An Evolutionary Approach. Addison-Wesley, 1986. | |
Dave Crane, Eric Pascarello, and Darren James. Ajax in Action. Manning, Greenwich, CT, 2006. | |
Margaret Cunningham. File Structure and Design. Chartwell-Bratt, 1985. | |
Michael A. Cusumano and Richard W. Selby. Microsoft Secrets. The Free Press, New York, 1995. | |
Michael A. Cusumano. The Business of Software: What Every Manager, Programmer, and Entrepreneur Must Know to Thrive and Survive in Good Times and Bad. The Free Press, New York, 2004. | |
Peter Daniel, editor. 16th International Conference on Computer Safety, Reliability and Security: SAFECOMP '97. European Workshop on Industrial Computer Systems: TC-7, Springer Verlag, September 1997. | |
Tina Darmohray, editor. Job Descriptions for System Administrators. Short Topics in System Administration. USENIX Association, Berkeley, CA, 1997. | |
Alan M. Davis. 201 Principles of Software Development. McGraw-Hill, 1995. | |
Fadi P. Deek and James A. M. McHugh. Open Source: Technology and Policy. Cambridge University Press, Cambridge, 2008. | |
Tom DeMarco and Timothy R. Lister. Peopleware: Productive Projects and Teams. Dorset House Publishing, 1987. | |
Peter J. Denning and Robert M. Metcalfe, editors. Beyond Calculation: The Next Fifty Years of Computing. Springer Verlag, 1997. | |
Dorothy Elizabeth Robling Denning. Cryptography and Data Security. Addison-Wesley, Reading, MA, 1983. | |
Peter J. Denning. Computers Under Attack: Intruders, Worms, and Viruses. Addison-Wesley, 1990. | |
Peter J. Denning, editor. Talking Back to the Machine. Springer Verlag, 1999. | |
Nachum Dershowitz and Edward M. Reingold. Calendrical Calculations. Cambridge University Press, Cambridge, 1997. | |
Dimitris K. Despotis and Constantin Zopounidis, editors. Proceedings of the 5th International Conference of the Decision Sciences Institute, DSI '99. Decision Sciences Institute, July 1999. | |
Giorgos Diakonikolaou, Athanasia Agiakatsika, and Ilias Mpouras. Corporate Internetworking. Kleidarithmos, Athens, Greece, 2004. In Greek. | |
Barbara L. Dijker, editor. A Guide to Developing Computing Policy Documents. Short Topics in System Administration. USENIX Association, Berkeley, CA, 1997. | |
Tony Dowden. Inside the EISA Computers. Addison-Wesley, 1990. | |
William Dunham. The Mathematical Universe. John Wiley & Sons, New York, 1994. | |
Margaret A. Ellis and Bjarne Stroustrup. The Annotated C++ Reference Manual. Addison-Wesley, Reading, MA, 1990. | |
Terry Escamilla. Intrusion Detection: Network Security Beyond the Firewall. Wiley, New York, 1998. | |
Brian D. Eubanks. Wicked Cool Java: Code Bits, Open-Source Libraries, and Project Ideas. No Starch Press, San Francisco, 2006. | |
European UNIX systems User Group. 10th Anniversary Conference Proceedings: UNIX around the World, April 1988. | |
European UNIX systems User Group. Autumn 1988 Conference Proceedings: New Directions for UNIX, October 1988. | |
European UNIX systems User Group. Autumn '89 Conference Proceedings, September 1989. | |
Jim Farley, William Crawford, and David Flanagan. Java Enterprise in a Nutshell. O'Reilly and Associates, Sebastopol, CA, second edition, 2002. | |
Michael Feathers. Working Effectively with Legacy Code. Prentice Hall, Englewood Cliffs, NJ, 2005. | |
Anthony J. Field and Peter G. Harrison. Functional Programming. Addison-Wesley, 1988. | |
Simone Fisher-Hübner, Gerald Quirchmayr, and Louise Yngström, editors. User Identification & Privacy Protection: Applications in Public Administration & Electronic Commerce. IFIP WG 8.5 and WS 9.6, June 1999. | |
David Flanagan. Java in a Nutshell. O'Reilly and Associates, Sebastopol, CA, 1997. | |
Tom Forester and Perry Morrison. Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing. MIT Press, Cambridge, MA, 1990. | |
Martin Fowler and Kendall Scott. UML Distilled: Applying the Standard Object Modeling Language. Addison-Wesley, Boston, MA, second edition, 2000. | |
Martin Fowler. Refactoring: Improving the Design of Existing Code. Addison-Wesley, Boston, MA, 2000. | |
Martin Fowler. Domain-Specific Languages. Addison-Wesley, Boston, MA, 2010. | |
Mark Frauenfelder. The Best of Make. O'Reilly, Sebastopol, CA, 2007. | |
Robert Fulghum. All I Really Need to Know I Learned in Kindergarten: Uncommon Thoughts on Common Things. Ivy Books, reissue edition, 1993. | |
Carl C. Gaither and Alma E. Cavazos-Gaither. Mathematically Speaking: A Dictionary Quotations. Institute of Physics Publishing, Bristol and Philadelphia, 1998. | |
Carl C. Gaither and Alma E. Cavazos-Gaither, editors. Practically Speaking: A Dictionary of Quotations on Engineering, Technology and Architecture. Institute of Physics Publishing, Bristol and Philadelphia, 1999. | |
Erich Gamma and Kent Beck. Contributing to Eclipse: Principles, Patterns, and Plug-Ins. Addison-Wesley, Boston, MA, 2004. | |
Erich Gamma, Richard Helm, Ralph Johnson, and John Vlissides. Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, Reading, MA, 1995. | |
Narain Gehani. Document Formatting and Typesetting on the UNIX System. Silicon Press, Summit, NJ, second edition, 1987. | |
Narain Gehani. Bell Labs: Life in the Crown Jewel. Silicon Press, Summit, NJ, 2003. | |
Andrew S. Glassner. Graphics Gems. Academic Press, 1990. | |
Adele Goldberg and David Robson. Smalltalk-80: The Language. Addison-Wesley, Reading, MA, 1989. | |
Dieter Gollmann. Computer Security. Wiley, Chichester, UK, 1999. | |
Pete Goodlife. Code Craft: The Practice of Writing Excellent Code. No Starch Press, San Francisco, 2007. | |
Michael Gosney, John Odam, and Jim Benson. The Gray Book: Designing in Black & White on your Computer. Vantana Press, second edition, 1990. | |
Paul Graham. Hackers & Painters: Big Ideas from the Computer Age. O'Reilly and Associates, Sebastopol, CA, 2004. | |
Paul R. Gray and Robert G. Meyer. Analysis and Design of Analog Integrated Circuits. John Wiley and Sons, New York, second edition, 1984. | |
John Grimond. The Economist Style Guide. Profile Books, London, 2010. | |
Stefanos Gritzalis, Sokratis Katsikas, and Dimitris Gritzalis. Computer Network Security. Papasotiriou, Athens, Greece, 2003. In Greek. | |
Dimitris Gritzalis, editor. IFIP TC5 WG5.4 3rd International Conference on Reliability, Quality & Safety of Software-Intensive Systems, ENCRESS '97. IFIP, Chapman & Hall, May 1997. | |
Stefanos Gritzalis. Information Systems Security in a Distributed Environment. PhD thesis, University of Athens, Athens, Greece, 1998. In Greek. | |
Mikell P. Groover. Automation, Production Systems, and Computer Integrated Manufacturing. Prentice Hall, Englewood Cliffs, NJ, 1987. | |
John Grossman, editor. The Chicago Manual of Style. The University of Chicago Press, Chicago and London, fourteenth edition, 1993. | |
Wulfram Grstner and Werner Kistler. Spiking Neuron Models: Single Neurons, Populations, Plasticity. Cambridge University Press, Cambridge, 2002. | |
Jürg Gutknecht, editor. Programming Languages and System Architectures International Conference. Springer-Verlag, March 1994. Lecture Notes in Computer Science 782. | |
Geoff Halprin, editor. A System Administrator's Guide to Auditing. Short Topics in System Administration. USENIX Association, Berkeley, CA, 2000. | |
Fred Halsall. Data Communications, Computer Networks and OSI. Addison-Wesley, second edition, 1988. | |
Samuel P. Harbison and Guy L. Steele Jr. C: A Reference Manual. Prentice Hall, Englewood Cliffs, NJ, third edition, 1991. | |
David Harel. Algorithmics: the Spirit of Computing. Addison-Wesley, 1987. | |
Elliotte Rusty Harold and W. Scott Means. XML in a Nutshell. O'Reilly and Associates, Sebastopol, CA, 2001. | |
Robert Harris. Enigma. Ballantine Books, Beverly Hills, CA, 1996. | |
Stephen W. Hawking. A Brief History of Time: from the Big Bang to the Black Holes. Bantam Press, 1988. | |
John L. Hennessy and David A. Patterson. Computer Architecture: A Quantitative Approach. Morgan Kaufmann, San Francisco, 1990. | |
Kevlin Henney, editor. 97 Things Every Programmer Should Know. O'Reilly, Sebastopol, CA, 2010. | |
Jack Herrington. PHP Hacks: Tips & Tools for Creating Dynamic Web Sites. O'Reilly, Sebastopol, CA, 2005. | |
Rafael Hirschfeld, editor. Financial Cryptography: First International Conference, FC '97. Springer Verlag, February 1997. Lecture Notes in Computer Science 1318. | |
C. A. R. Hoare. Communicating Sequential Processes. Prentice Hall, Englewood Cliffs, NJ, 1985. | |
Daniel M. Hoffman and David M. Weiss, editors. Software Fundamentals: Collected Papers by David L. Parnas. Addison-Wesley, Boston, MA, 2001. | |
Douglas R. Hofstadter. Goedel, Escher, Bach: an Eternal Golden Braid. Penguin Books, 1979. | |
Douglas R. Hofstadter. Metamagical Themas: Questing for the Essence of Mind and Pattern. Penguin Books, 1986. | |
Christopher John Hogger. Introduction to Logic Programming. Academic Press, 1984. | |
Paul Horowitz and Winfield Hill. The Art of Electronics. University Press, second edition, 1989. | |
Michael Howard and David LeBlanc. Writing Secure Code. Microsoft Press, Redmond, WA, second edition, 2003. | |
Paul Hudson. PHP in a Nutshell: A Desktop Quick Reference. O'Reilly, Sebastopol, CA, 2005. | |
Darrell Huff. How to Lie with Statistics. W. W. Norton & Company, New York, 1954. | |
Watts S. Humphrey. Managing the Software Process. Addison-Wesley, Reading, MA, 1989. | |
Andrew Hunt and David Thomas. The Pragmatic Programmer: From Journeyman to Master. Addison-Wesley, Boston, MA, 2000. | |
IBM Corporation. IBM Personal Computer Technical Reference Manual, 1983. | |
Adobe Systems Incorporated. Postscript Language Reference Manual. Addison-Wesley, 1985. | |
Adobe Systems Incorporated. Postscript Language Program Design. Addison-Wesley, 1988. | |
Michael Jackson. Software Requirements & Specifications: a Lexicon of Practice, Principles and Prejudices. Addison-Wesley, 1995. | |
Raj Jain. The Art of Computer Systems Performance Analysis. John Wiley and Sons, New York, 1991. | |
Michael Jenkin and Laurence Harris, editors. Computational and Psychophysical Mechanisms of Visual Coding. Cambridge University Press, Cambridge, 1997. | |
Nelson Johnson. Advanced Graphics in C: Programming and Techniques. Osborne McGraw Hill, 1987. | |
Steven Johnson. Everything Bad Is Good for You. Riverhead Trade, City, 2006. | |
Aviel William Strunk Jr. and E. B. White. The Elements of Style. Macmillan Publishing Co., New York, 1979. | |
David Kahn. The Codebreakers: The Story of Secret Writing. Scribner, New York, 1996. | |
Stephen H. Kan. Metrics and Models in Software Quality Engineering. Addison-Wesley, Boston, MA, second edition, 2002. | |
Cem Kaner, Jack Falk, and Hung Quoc Nguyen. Testing Computer Software. Wiley, New York, second edition, 1999. | |
Dimitris Karagiannis, editor. DEXA 94: 5th International Conference on Database and Expert Systems Applications. Springer-Verlag, September 1994. Lecture Notes in Computer Science 856. | |
Sokratis K. Katsikas and Dimitris Gritzalis, editors. Information Systems Security: Facing the Information Society of the 21st Century. Chapman & Hall, 1996. | |
Sokratis K. Katsikas, Stefanos Gritzalis, and Javier Lopez, editors. Public Key Infrastructure: First European PKI Workshop: Research and Applications, EuroPKI 2004. Springer-Verlag, June 2004. Lecture Notes in Computer Science 3093. | |
Sokratis Katsikas, editor. Proceedings CMS '97 3rd IFIP TC6/TC11 International joint working Conference on Communications and Multimedia Security. IFIP, Chapman & Hall, September 1997. | |
Simeon Keates and John Clarkson. Countering Design Exclusion: An Introduction to Inclusive Design. Springer-Verlag, London, 2004. | |
Brian W. Kernighan and Rob Pike. The UNIX Programming Environment. Prentice Hall, Englewood Cliffs, NJ, 1984. | |
Brian W. Kernighan and Rob Pike. The Practice of Programming. Addison-Wesley, Reading, MA, 1999. | |
Brian W. Kernighan and P. J. Plauger. Software Tools. Addison-Wesley, Reading, MA, 1976. | |
Brian W. Kernighan and P. J. Plauger. The Elements of Programming Style. McGraw-Hill, New York, second edition, 1978. | |
Brian W. Kernighan and Dennis M. Ritchie. The C Programming Language. Prentice Hall, Englewood Cliffs, NJ, first edition, 1978. | |
Brian W. Kernighan and Dennis M. Ritchie. The C Programming Language. Prentice Hall, Englewood Cliffs, NJ, second edition, 1988. | |
K. N. King. Java Programming: from the Beginning. W. W. Norton & Company, New York, 2000. | |
Stephen King. On Writing: A Memoir of the Craft. New English Library/Hodder & Stoughton, London, 2001. | |
Lars Klander. Hacker Proof: the Ultimate Guide to Network Security. Jamsa Press, Las Vegas, NV, 1997. | |
Elizabeth Knowles, editor. The Oxford Dictionary of Twenthieth Century Quotations. Oxford University Press, 1998. | |
Donald E. Knuth. The Art of Computer Programming, volume 1: Fundamental Algorithms. Addison-Wesley, Reading, MA, second edition, 1973. | |
Donald E. Knuth. The Art of Computer Programming, volume 3: Sorting and Searching. Addison-Wesley, Reading, MA, 1973. | |
Donald E. Knuth. The Art of Computer Programming, volume 2: Seminumerical Algorithms. Addison-Wesley, Reading, MA, second edition, 1981. | |
Donald E. Knuth. The METAFONTbook. Addison-Wesley, Reading, MA, 1986. | |
Donald E. Knuth. The TeXbook. Addison-Wesley, Reading, MA, 1989. | |
Donald E. Knuth. Selected Papers on Computer Science. Cambridge University Press, Cambridge, 1996. CSLI Lecture Notes Number 59. | |
Donald E. Knuth. The Art of Computer Programming, volume 1: Fundamental Algorithms. Addison-Wesley, Reading, MA, third edition, 1997. | |
Andrew Koenig. C Traps and Pitfalls. Addison-Wesley, Reading, MA, 1988. | |
Henry F. Korth and Abraham Silberschatz. Database System Concepts. McGraw-Hill, second edition, 1991. | |
Glenn Krasner. Smalltalk-80: Bits of History, Words of Advice. Addison-Wesley, 1983. | |
Susan Lammers. Programmers at Work. Microsoft Press, Redmond, WA, 1989. | |
Leslie Lamport. LATEX: A Document Preparation System. Adisson-Wesley, Reading, MA, 1985. | |
Leslie Lamport. LATEX: A Document Preparation System. Adisson-Wesley, Reading, MA, second edition, 1994. | |
Günther Lamprecht. Introduction to SIMULA-67. Friedr. Vieweg & Sohn, Braunschweig, Wiesbaden, Germany, 1981. | |
Samuel J. Leffler, Marshall Kirk McKusick, Michael J. Karels, and John S. Quarterman. The Design and Implementation of the 4.3BSD Unix Operating System. Addison-Wesley, Boston, MA, 1988. | |
Meir M. Lehman and Laszlo A. Belady. Program Evolution: Processes of Software Change. Academic Press, 1985. | |
LH Software. FESPA for Windows. Kleidarithmos, Athens, Greece, 1998. In Greek. | |
Don Libes and Sandy Ressler. Life with UNIX. Prentice Hall, Englewood Cliffs, NJ, 1989. | |
Don Libes. Obfuscated C and Other Mysteries. John Wiley and Sons, New York, 1993. | |
Spyros P. Libieratos and Dimitris K. Charamidopoulos. The Computation of Space Structures. Kleidarithmos, Athens, Greece, 1996. In Greek. | |
Tim Lindhorn and Frank Yellin. The Java Virtual Machine Specification. The Java Series. Addison-Wesley, Reading, MA, 1997. | |
John Lions. Lions' Commentary on Unix 6th Edition with Source Code. Annabooks, Poway, CA, 1996. | |
Bernice Sacks Lipkin. Latex for Linux: A Vade Mecum. Springer Verlag, 1999. | |
Stanley B. Lippman. A C++ Primer. Addison-Wesley, 1989. | |
Spyros Livieratos and Dimitris Charamidopoulos, editors. Tekton for Windows. Klitharithmos, Athens, Greece, 1996. In Greek. | |
Christos K. K. Loverdos and Apostolos Syropoulos. Steps in Scala: An Introduction to Object-Functional Programming. Cambridge University Press, Cambridge, 2010. | |
Steve Maguire. Writing solid code: Microsoft's techniques for developing bug-free programs. Microsoft Press, Redmond, WA, 1993. | |
Mary Manns and Linda Rising. Fearless Change. Twayne Publishers, Boston, 2005. | |
Joe Marasco. The Software Development Edge: Essays on Managing Succesful Projects. Addison-Wesley, Boston, MA, 2005. | |
Robert C. Martin. UML for Java Programmers. Prentice Hall, Upper Saddle River, NJ, 2002. | |
Robert C. Martin. Agile Software Development: Principles, Patterns, and Practices. Prentice Hall, Upper Saddle River, NJ, 2003. | |
Norman Matloff and Peter Jay Salzman. The Art of Debugging with GDB, DDD, and Eclipse. No Starch Press, San Francisco, 2008. | |
Clive ``Max'' Maxfield. Bebop to the Boolean Boogie. Newnes, 2003. | |
Pete McBreen. Software Craftsmanship: The New Imperative. Addison-Wesley, 2002. | |
Steve C McConnell. Code Complete : A Practical Handbook of Software Construction. Microsoft Press, Redmond, WA, 1993. | |
Steve C McConnell. Code Complete: A Practical Handbook of Software Construction. Microsoft Press, Redmond, WA, second edition, 2004. | |
Andrew D. McGettrick. The Definition of Programming Languages. Cambridge University Press, 1980. | |
Gary McGraw and Edward W. Felten. Securing Java: Getting Down to Business with Mobile Code. Wiley, New York, second edition, 1999. | |
Kathryn S. McKinley, editor. 20 Years of the ACM SIGPLAN Conference on Programming Language Design and Implementation 1979-1999, A Selection. ACM, 2004. | |
Marshall Kirk McKusick and George V. Neville-Neil. The Design and Implementation of the FreeBSD Operating System. Addison-Wesley, Reading, MA, 2004. | |
David G. Messerschmitt and Clemens Szyperski. Software Ecosystem: Understanding an Indispensable Technology and Industry. MIT Press, Cambridge, MA, 2004. | |
Bertrand Meyer. Object-oriented Software Construction. Prentice Hall, Englewood Cliffs, NJ, 1988. | |
Scott Meyers. Effective C++. Addison-Wesley, Reading, MA, second edition, 1998. | |
Scott Meyers. Effective STL. Addison-Wesley, Reading, MA, 2001. | |
Microsoft Corporation. Microsoft C# Language Specifications. Microsoft Press, Redmond, WA, 2001. | |
Robert Milne and Christopher Strachey. A Theory of Programming Language Semantics. Chapman and Hall, London, UK, 1976. | |
Trevor Misfeldt, Gregory Bumgardner, and Andrew Gray. The Elements of C++ Style. Cambridge University Press, Cambridge, 2004. | |
Geoffrey A. Moore. Crossing the Chasm. HarperCollins, New York, 1991. | |
Sape Mullender, editor. Distributed Systems. Addison-Wesley, 1989. | |
Jackie Neider, Tom Davis, and Mason Woo. OpenGL Programming Guide: The Official Guide to Learning OpenGL. Addison-Wesley, 1993. | |
Peter G. Neumann. Computer Related Risks. Addison-Wesley, 1995. | |
Joe Nickell, Barry Karr, and Tom Genoni, editors. The Outer Edge: Classic Investigations of the Paranormal. CSICOP Inc., Amherst, NY, 1996. | |
Hanne Riis Nielson and Flemming Nielson. Semantics with Applications: An Appetizer. Springer, 2007. | |
Donald A. Norman. The Psychology of Everyday Things. BasicBooks, New York, 1988. | |
Donald A. Norman. The Invisible Computer. MIT Press, Cambridge, MA, 1998. | |
Beth Simone Noveck. Wiki Government: How Technology Can Make Government Better, Democracy Stronger, and Citizens More Powerful. Brookings Institution Press, Washington, D.C., 2009. | |
Martin Odersky, Lex Spoon, and Bill Venners. Programming in Scala: A Comprehensive Step-by-Step Guide. Artima, Mountain View, CA, 2009. | |
Richard A. O'Keefe. The Craft of Prolog. MIT Press, Cambridge, MA, 1990. | |
David L. Oppenheimer, David A. Wagner, and Michele D. Crabb. System Security: A Management Perspective. Short Topics in System Administration. USENIX Association, Berkeley, CA, 1997. | |
Andy Oram and Greg Wilson. Beautiful Code: Leading Programmers Explain How They Think. O'Reilly and Associates, Sebastopol, CA, 2007. | |
Andy Oram and Greg Wilson, editors. Making Software: What Really Works, and Why We Believe It. O'Reilly and Associates, Sebastopol, CA, 2010. | |
Tim O'Reilly and Sarah Milstein. The Twitter Book. O'Reilly, Sebastopol, CA, 2009. | |
John K. Ousterhout. Tcl and the Tk Toolkit. Addison-Wesley, 1994. | |
Chrissoleon T. Papadopoulos, Michael E. J. O'Kelly, Michael J. Vidalis, and Diomidis Spinellis. Analysis and Design of Discrete Part Production Lines. Springer, 2009. (doi:10.1007/978-0-387-89494-2_6) | |
Emil Pascarelli and Deborah Quilter. Repetitive Strain Injury. John Wiley & Sons, New York, 1994. | |
Roger Penrose. The Emperor's new mind concerning computers, minds and the laws of physics. Oxford University Press, 1989. | |
Henry Petroski. To Engineer is Human: The Role of Failure in Successful Design. Vintage Books, New York, 1992. | |
Henry Petroski. Design Paradigms: Case Histories of Error and Judgement in Engineering. Cambridge University Press, Cambridge, 1994. | |
Henry Petroski. The Book on the Bookshelf. Vintage Books, New York, 1999. | |
Charles Petzold. Programming Windows: the Microsoft Guide to Writing Applications for Windows 3. Microsoft Press, Redmond, WA, second edition, 1990. | |
Simon L. Peyton Jones. The Implementation of Functional Programming Languages. Prentice Hall, Englewood Cliffs, NJ, 1987. | |
Charles P. Pfleeger and Shari Lawrence Pfleeger. Security in Computing. Prentice Hall, Englewood Cliffs, NJ, fourth edition, 2007. | |
Benjamin C. Pierce. Types and Programming Languages. MIT Press, Cambridge, MA, 2002. | |
Lewis J. Pinson and Richard S. Wiener. An Introduction to Object-Oriented Programming and Smalltalk. Addison-Wesley, 1988. | |
Robert M. Pirsig. Zen and the Art of Motorcycle Maintenance. Vintage, London, 1991. First published in Great Britain by the Bodley Head, 1974. | |
P. J. Plauger. Programming on Purpose: Essays on Software Design. Prentice Hall, Englewood Cliffs, NJ, 1993. | |
P. J. Plauger. Programming on Purpose II: Essays on Software People. Prentice Hall, Englewood Cliffs, NJ, 1993. | |
P. J. Plauger. Programming on Purpose III: Essays on Software Technology. Prentice Hall, Englewood Cliffs, NJ, 1994. | |
David Pogue. The World According to Twitter. Black Dog & Leventhal Publishers, New York, 2009. | |
Ken C. Pohlman. The Compact Disc Handbook. Oxford University Press, 1992. | |
Ben Potter, Jane Sinclair, and David Till. An Introduction to Formal Specification and Z. Prentice Hall, Englewood Cliffs, NJ, 1991. | |
William H. Press, Brian P. Flannery, Saul A. Teukolsky, and William T. Vetterling. Numerical Recipes Example Book (C). Cambridge University Press, 1988. | |
William H. Press, Brian P. Flannery, Saul A. Teukolsky, and William T. Vetterling. Numerical Recipes in C. Cambridge University Press, 1988. | |
William H. Press, Saul A. Teukolsky, William T. Vetterling, and Brian P. Flannery. Numerical Recipes in C++. Cambridge University Press, Cambridge, second edition, 2002. | |
Roger S. Pressman. Software Engineering: A Practitioner's Approach. McGraw-Hill, 1987. | |
Roger S. Pressman. Software Engineering: A Practitioner's Approach. McGraw-Hill, London, fifth edition, 2000. European Adaptation. Adapted by Darrel Ince. | |
Dave Radin. Building a Successful Software Business. O'Reilly and Associates, Sebastopol, CA, 1994. | |
Raghu Ramakrishnan and Johannes Gehrke. Database Management Systems. McGraw-Hill, second edition, 2000. | |
Jef Raskin. The Humane Interface: New Directions for Designing Interactive Systems. Addison-Wesley, Boston, MA, 2000. | |
Eric Raymond. The New Hacker's Dictionary. MIT Press, Cambridge, MA, 1991. | |
Eric Steven Raymond. The Art of Unix Programming. Addison-Wesley, 2003. | |
Casey Read and Ben Fry. Processing: A Programming Handbook for Visual Designers and Artists. MIT Press, Cambridge, MA, 2007. | |
David Reed. A Balanced Introduction to Computer Science. Pearson Prentice Hall, Upper Saddle River, NJ, 2005. | |
Eric Rescorla. SSL and TLS. Addison-Wesley, 2001. | |
Garr Reynolds. Presentation Zen: Simple Ideas on Presentation Design on Presentation Design and Delivery. New Riders, Berkeley, CA, 2008. | |
Charles Rich and Richard C. Waters, editors. Readings in Artifical Intelligence and Software Engineering. Morgan Kaufmann, San Francisco, 1986. | |
Elaine Rich. Artificial Intelligence. McGraw-Hill, 1983. | |
Kay A. Robbins and Steven Robbins. UNIX Systems Programming: Communication, Concurrency, and Threads. Prentice Hall, Upper Saddle River, NJ, 2003. | |
Arnold Robbins. bash Quick Reference. O'Reilly Media, Sebastopol, CA, 2006. | |
Marshall T. Rose. The Open Book: A Practical Perspective on OSI. Prentice Hall, Englewood Cliffs, NJ, 1989. | |
Sheldon M. Ross. Introduction to Probability and Statistics for Engineers and Scientists. Elsevier Academic Press, third edition, 2004. | |
Aviel D. Rubin, Daniel Geer, and Marcus J. Ranum. Web Security Sourcebook. John Wiley & Sons, New York, 1997. | |
Steven M. Rubin. Computer Aids for VLSI Design. Addison-Wesley, 1987. | |
James Rumbaugh, Michael Blaha, William Premerlani, Frederick Eddy, and William Lorensen. Object-Oriented Modeling and Design. Prentice Hall, Englewood Cliffs, NJ, 1991. | |
James Rumbaugh, Ivar Jacobson, and Grady Booch. The Unified Modeling Language Reference Manual. Addison-Wesley, Reading, MA, 1999. | |
Thomas P. Ryan. Modern Engineering Statistics. Wiley-Interscience, 2007. | |
Jerome H. Saltzer and M. Frans Kaashoek. Principles of Computer System Design: An Introduction. Morgan Kaufmann, San Diego, 2009. | |
Peter H. Salus, editor. Handbook of Programming Languages, volume I: Object-Oriented Programming Languages. Macmillan Technical Publishing, Indianapolis, IN, 1998. | |
Peter H. Salus, editor. Handbook of Programming Languages, volume II: Imperative Programming Languages. Macmillan Technical Publishing, Indianapolis, IN, 1998. | |
Peter H. Salus, editor. Handbook of Programming Languages, volume III: Little Languages and Tools. Macmillan Technical Publishing, Indianapolis, IN, 1998. | |
Peter H. Salus, editor. Handbook of Programming Languages, volume IV: Functional and Logic Programming Languages. Macmillan Technical Publishing, Indianapolis, IN, 1998. | |
Charles H. Schmauch. ISO 9000 for Software Developers. ASQC Quality Press, Milwaukee, WI, 1995. | |
David A. Schmidt. Denotational Semantics: A Methodology for Language Development. Wm. C. Brown, 1986. | |
Bruce Schneier. Applied Cryptography. Wiley, New York, second edition, 1996. | |
Bruce Schneier. Secrets & Lies: Digital Security in a Networked World. Wiley, New York, 2000. | |
Bruce Schneier. Beyond Fear: Thinking Sensibly about Security in an Uncertain World. Copernicus Books, New York, 2003. | |
G. I. Schuëller and P. Kafka, editors. Proceedings ESREL '99 — The Tenth European Conference on Safety and Reliability. ESRA, VDI, TUM, A. A. Balkema, September 1999. | |
Norbert Schwarz. Introduction to TeX. Addison-Wesley, 1989. | |
Robert Sedgewick. Algorithms in C. Addison-Wesley, Reading, MA, 1990. | |
John Sellens, editor. System and Network Administration for Higher Reliability. Short Topics in System Administration. USENIX Association, Berkeley, CA, 2001. | |
Motorola Semiconductors. M68000 16/32-Bit Microprocessor Programmer's Reference Manual. Motorola Semiconductors, fourth edition, 1984. | |
Hemant Sengar. Security of ublic and IP Telephone Networks: A Security Assessment of SS7, SIGTRAN and VoIP Protocols. VMD Verlag Dr. Müller, Saarbrücken, Germany, 2008. | |
Ravi Sethi. Programming Languages: Concepts and Constructs. Addison-Wesley, Reading, MA, 1989. | |
Ben Shneiderman. Designing the User Interface: Strategies for Effective Human-Computer-Interaction. Addison-Wesley, Boston, MA, third edition, 1998. | |
Michael Shortland and Jane Gregory. Communicating Science: A Handbook. Longman Scientific & Technical, 1991. | |
Charles H. Sides. How to Write and Present Technical Information. Cambridge University Press, Cambridge, 1991. | |
Bud E. Smith and Mark T. Johnson. Programming the Intel 80386. Scott, Foresman and Company, 1987. | |
Ian Sommerville. Software Engineering. Addison-Wesley, third edition, 1989. | |
Ian Sommerville. Software Engineering. Addison-Wesley, sixth edition, 2001. | |
Sulayman K. Sowe, Ioannis G. Stamelos, and Ioannis Samoladas, editors. Emerging Free and Open Source Software Practices. IGI Publishing, Hershey, PA, 2007. | |
Diomidis Spinellis and Georgios Gousios, editors. Beautiful Architecture: Leading Software Engineers Explain How They Think. O'Reilly, Sebastopol, CA, 2009. | |
Dionysios Spinellis, editor. Computer Crimes Cyber-Terrorism Child Pornography and Financial Crimes: Reports presented to the Prepapratory Colloquy for the Round Table II of the 17th International Congress of Penal Law (Beijing 2004). Ant. N. Sakkoulas, April 2003. | |
Diomidis Spinellis. Code Reading: The Open Source Perspective. Addison-Wesley, Boston, MA, 2003. | |
Diomidis Spinellis, editor. Cross-Media Service Delivery, volume 740 of The Kluwer international series in engineering and computer science. Kluwer Academic Publishers, Boston, MA, 2003. | |
Diomidis Spinellis. Code Quality: The Open Source Perspective. Addison-Wesley, Boston, MA, 2006. | |
Maureen Sprankle and Jim Hubbard. Problem Solving & Programming Concepts. Pearson Education, eighth edition, 2009. | |
Leon Sterling and Ehud Shapiro. The Art of Prolog. MIT Press, Cambridge, MA, 1986. | |
W. Richard Stevens, Bill Fenner, and Andrew M. Rudoff. UNIX Network Programming, volume 1. Pearson Education, 2003. | |
W. Richard Stevens. UNIX Network Programming. Prentice Hall, Englewood Cliffs, NJ, 1990. | |
W. Richard Stevens. Advanced Programming in the UNIX Environment. Addison-Wesley, 1992. | |
Clifford Stoll. The Cuckoo's Egg: Tracking a Spy Through a Maze of Computer Espionage. The Bodley Head, London, 1989. | |
Clifford Stoll. Silicon Snake Oil. Macmillan Publishing Co., 1995. | |
Thomas Strothotte and Stefan Schlechtweg. Non-Photorealistic Computer Graphics. Morgan Kaufmann, San Francisco, 2002. | |
Bjarne Stroustrup. The C++ Programming Language. Addison-Wesley, 1986. | |
Bjarne Stroustrup. The C++ Programming Language. Addison-Wesley, second edition, 1991. | |
Bjarne Stroustrup. The C++ Programming Language. Addison-Wesley, Reading, MA, third edition, 1997. | |
Ed Sullivan. Under Pressure and On Time. Microsoft Press, Redmond, WA, 2001. | |
Herb Sutter and Andrei Alexandrescu. C++ Coding Standards: 101 Rules, Guidelines, and Best Practices. Addison Wesley, 2004. | |
Herb Sutter. Exceptional C++ Style: 40 New Engineering Puzzles, Programming Problems, and Solutions. Addison Wesley, 2004. | |
AT & T, editor. UNIX System Readings and Applications, volume II. Prentice Hall, Englewood Cliffs, NJ, 1987. | |
Andrew S. Tanenbaum. Operating Systems: Design and Implementation. Prentice Hall, Englewood Cliffs, NJ, 1987. | |
Andrew S. Tanenbaum. Computer Networks. Prentice Hall, Englewood Cliffs, NJ, second edition, 1988. | |
Adrienne Tannenbaum. Metadata Solutions. Addison-Wesley, 2002. | |
Kevin Tate. Sustainable Software Development. Addison-Wesley, Boston, MA, 2006. | |
Paul Teetor. R Cookbook. O'Reilly and Associates, Sebastopol, CA, 2011. | |
R. D. Tennent. Princliples of Programming Languages. Prentice Hall, Englewood Cliffs, NJ, 1981. | |
The Accredited Standard Committee X3, Information Processing Systems, Technical Committee for Programming Language C (X3J11). Rationale for the ANSI C Programming Language. Silicon Press, Summit, NJ, 1990. | |
Edward R. Tufte. The Visual Display of Quantitative Information. Graphics Press, Cheshire, CT, 1983. | |
Efraim Turban, Jae Lee, David King, and H. Michael Chung. Electronic Commerce: A Managerial Perspective. Prentice–Hall, Englewood Cliffs, NJ, 2000. | |
James Turnbull and Jeffrey McCune. Pro Puppet. Apress, Berkeley, CA, 2011. | |
Wladyslaw M. Turski and Thomas S. E. Maibaum. The Specification of Computer Programs. Addison-Wesley, 1987. | |
University of the Aegean, Department of Business Administration. Second International Aegean Conference on the Analysis and Modelling of Manufacturing Systems, May 1999. | |
Proceedings of the Summer 1988 USENIX Conference. USENIX Association, June 1988. | |
John R. Vacca. Intranet Security. Charles River Media, Inc., Rockland, MA, 1997. | |
Arthur van Hoff, Sami Shaio, and Orca Starbuck. Hooked on Java. Addison-Wesley, 1996. | |
Jan van Leeuwen, editor. Computer Science Today: Recent Trends and Developments. Springer Verlag, 1995. Lecture Notes in Computer Science 1000. | |
John Viega and Gary McGraw. Building Secure Software: How to Avoid Security Problems the Right Way. Addison-Wesley, Boston, MA, 2001. | |
John Viega. The Myths of Security: What the Computer Security Industry Doesn't Want You to Know. O'Reilly, Sebastopol, CA, 2009. | |
Jesse Vincent, Robert Spier, Dave Rolsky, Darren Chamberlain, and Richard Foley. RT Essentials. O'Reilly and Associates, Sebastopol, CA, 2005. | |
Mitchell Waite, editor. UNIX Papers for UNIX Developers and Power Users. Howard W. Sams & Company, 1987. | |
Jeff Walden. File Formats for Popular PC Software: A Programmer's Reference. John Wiley & Sons, New York, 1986. | |
Jeff Walden. More File Formats for Popular PC Software: A Programmer's Reference. John Wiley & Sons, New York, 1987. | |
Larry Wall and Randal L. Schwartz. Programming Perl. O'Reilly and Associates, Sebastopol, CA, 1990. | |
Henry S. Warren Jr. Hacker's Delight. Addison-Wesley, Boston, MA, 2003. | |
Damien Watkins, Mark Hammond, and Brad Abrams. Programming in the .NET Environment. Addison-Wesley, Reading, MA, 2002. | |
Alan Watt and Mark Watt. Advanced Animation and Rendering Techniques. Addison-Wesley, Reading, MA, 1992. | |
Gerald M. Weinberg. The Psychology of Computer Programming. Dorset House Publishing, New York, silver anniversary edition, 1998. | |
Joseph Weizenbaum. Computer Power and Human Reason. Pelican books, 1984. | |
Brian Chess Jacob West. Secure programming with static analysis. Addison-Wesley, Boston, MA, 2007. | |
Michael A. Williams. A History of Computing Technology. IEEE Computer Society Press, 1997. | |
Al Williams. Microcontroller Projects with Basic Stamps. R&D Books, 2000. | |
Niklaus Wirth. Programming in Modula-2. Springer Verlag, third edition, 1985. | |
Helen Wright. Introduction to Scientific Visualization. Springer, 2007. | |
Louise Yngström and Simone Fisher-Hübner, editors. WISE 1: First World Conference on Information Security Education. IFIP TC11 WG 11.8, June 1999. | |
Edward Yourdon. Decline & Fall of the American Programmer. Prentice Hall, Englewood Cliffs, NJ, 1993. | |
Edward Yourdon. Death March. Prentice Hall, Englewood Cliffs, NJ, 1997. | |
Ruixi Yuan and W. Timothy Strayer. Virtual Private Networks: Technologies and Solutions. Addison-Wesley, 2001. | |
William Zinsser. On Writing Well. HarperCollins, London, 2006. | |
Elizabeth Zwicky, Simon Cooper, and D. Brent Chapman. Building Internet Firewalls. O'Reilly and Associates, Sebastopol, CA, second edition, 2000. |