Turkish: A Comprehensive Grammar (Comprehensive Grammars)
View more
Turkish: A Comprehensive Grammar (Comprehensive Grammars)
Data and Computer Communications: Networking and Internetworking - Gurdeep S. Hura and Mukesh Singhal
View more
Data and Computer Communications: Networking and Internetworking - Gurdeep S. Hura and Mukesh Singhal
Complete Reference to Professional Soa with Visual Studio 2005 (C# and VB 2005). Net 3. 0
View more
Complete Reference to Professional Soa with Visual Studio 2005 (C# and VB 2005). Net 3. 0
An experimental comparison of listening comprehensibility with reading comprehensibility
View more
An experimental comparison of listening comprehensibility with reading comprehensibility
Data Science at the Command Line 2nd Edition - Jeroen Janssens
View more
Data Science at the Command Line 2nd Edition - Jeroen Janssens
Mastering High Performance with Kotlin: Overcome performance difficulties in Kotlin with a range of exciting techniques and solutions
View more
Mastering High Performance with Kotlin: Overcome performance difficulties in Kotlin with a range of exciting techniques and solutions
Comment décarboner le transport routier en France ? (TRANSVALOR) (French Edition)
View more
Comment décarboner le transport routier en France ? (TRANSVALOR) (French Edition)
Clinical Practice Companion
View more
Clinical Practice Companion
Death Comes as the End
View more
Death Comes as the End
Linux: 3 books in 1 : Linux for Beginners + Linux Command Lines and Shell Scripting + Linux Security and Administration
View more
Linux: 3 books in 1 : Linux for Beginners + Linux Command Lines and Shell Scripting + Linux Security and Administration
Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings
View more
Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings
Securing the Cloud: Cloud Computer Security Techniques and Tactics - Vic (J.R.) Winkler
View more
Securing the Cloud: Cloud Computer Security Techniques and Tactics - Vic (J.R.) Winkler
Low-altitude wind shear and its hazard to aviation : report of the Committee on Low-Altitude Wind Shear and Its Hazard to Aviation.
View more
Low-altitude wind shear and its hazard to aviation : report of the Committee on Low-Altitude Wind Shear and Its Hazard to Aviation.
Designing Components with the C++ STL - Ulrich Breymann
View more
Designing Components with the C++ STL - Ulrich Breymann
Problems in Complex Variable Theory
View more
Problems in Complex Variable Theory
Analysis for Computer Scientists: Foundations, Methods, and Algorithms - Michael Oberguggenberger and Alexander Ostermann
View more
Analysis for Computer Scientists: Foundations, Methods, and Algorithms - Michael Oberguggenberger and Alexander Ostermann
Computer Forensics For Dummies - Linda Volonino and Reynaldo Anzaldua
View more
Computer Forensics For Dummies - Linda Volonino and Reynaldo Anzaldua
Raspberry Pi Supercomputing and Scientific Programming: MPI4PY, NumPy, and SciPy for Enthusiasts
View more
Raspberry Pi Supercomputing and Scientific Programming: MPI4PY, NumPy, and SciPy for Enthusiasts