Computer Network Security: Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003. Proceedings
View more
Computer Network Security: Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003. Proceedings
Programming Computer Vision with Python - Jan Erik Solem
View more
Programming Computer Vision with Python - Jan Erik Solem
The Physics of Multiply and Highly Charged Ions: Volume 1. Sources, Applications and Fundamental Processes
View more
The Physics of Multiply and Highly Charged Ions: Volume 1. Sources, Applications and Fundamental Processes
The Mammoth Book of Locked-Room Mysteries and Impossible Crimes
View more
The Mammoth Book of Locked-Room Mysteries and Impossible Crimes
The Power of Charm: How to Win Anyone Over in Any Situation
View more
The Power of Charm: How to Win Anyone Over in Any Situation
Software Design X-Rays: Fix Technical Debt with Behavioral Code Analysis
View more
Software Design X-Rays: Fix Technical Debt with Behavioral Code Analysis
Beginning HTML with CSS and XHTML: Modern Guide and Reference (Beginning: from Novice to Professional)
View more
Beginning HTML with CSS and XHTML: Modern Guide and Reference (Beginning: from Novice to Professional)
Natural Cancer Treatments (Gerson Therapy, Budwig Protocol, Essiac, B17, Cornelius Moerman, Matthias Rath, etc) - PHI NATURAL HEALTH INTERNATIONAL
View more
Natural Cancer Treatments (Gerson Therapy, Budwig Protocol, Essiac, B17, Cornelius Moerman, Matthias Rath, etc) - PHI NATURAL HEALTH INTERNATIONAL
实分析与泛函分析 (Real analysis and functional analysis)
View more
实分析与泛函分析 (Real analysis and functional analysis)
gRPC: Up and Running - Kasun Indrasiri and Danesh Kuruppu
View more
gRPC: Up and Running - Kasun Indrasiri and Danesh Kuruppu
Classic works on the Dempster-Shafer theory of belief functions: 43 tables
View more
Classic works on the Dempster-Shafer theory of belief functions: 43 tables
Visio 2013图形设计从新手到高手(配光盘)(从新手到高手)
View more
Visio 2013图形设计从新手到高手(配光盘)(从新手到高手)
反动的修辞: 保守主义的三个命题 (The Rhetoric of Reaction: Perversity, Futility, Jeopardy)
View more
反动的修辞: 保守主义的三个命题 (The Rhetoric of Reaction: Perversity, Futility, Jeopardy)
利用Python进行数据分析(Python For Data Analysis中文版)
View more
利用Python进行数据分析(Python For Data Analysis中文版)
AsteriskNOW - Nir Simionovich
View more
AsteriskNOW - Nir Simionovich
Using Node.js for UI Testing - Pedro Teixeira
View more
Using Node.js for UI Testing - Pedro Teixeira
Modern Control Design With MATLAB and SIMULINK
View more
Modern Control Design With MATLAB and SIMULINK
Wiley CPAexcel Exam Review 2015 Focus Notes: Business Environment and Concepts
View more
Wiley CPAexcel Exam Review 2015 Focus Notes: Business Environment and Concepts