Title: Die Sketchnote Starthilfe: Über 200 Strich-für-Strich-Anleitungen und Schriften zum Nachzeichnen, Author: Tanja Wehr
Created with Sketch.
Close
Created with Sketch.
Created with Sketch.

Cracking Top Tech Frontend Interviews: A complete guide to mastering frontend technologies for interviews: HTML, CSS, A11Y, JS & React
by DSA Shots
Narrated by  H. Green
Audiobook (Unabridged) $15.23
. Price is $15.23 . You save %.
OR

FREE with a B&N Audiobooks Subscription trial!

Title: Ethical Hacking and Penetration, Step by Step with Kali Linux, Author: Rassoul Ghaznavi-zadeh
Title: AI Made Simple: Empowering Life After 55:Accessibility Handbook, Author: Steve Munkeby
Title: Introduction to Quantum Computing & Machine Learning Technologies (1, #1), Author: M. Sreedevi
Title: Picture Yourself Learning Microsoft Office 2007, Author: Diane Koers
Title: Must Know High School Computer Programming, Author: Julie Sway
Title: Digital Depression: Information Technology and Economic Crisis, Author: Dan Schiller
Explore Series
Title: Verifizierung von IT-Experten am Beispiel des Systemhauses Microsoft, Author: Michael Hermanns
Title: Homeoffice und mobiles Arbeiten im Team effektiv umsetzen: Praxisratgeber: Remote Work und Heimarbeitsplatz technisch schnell einrichten, Author: Peter Bruhn
Title: MS Word Legal -- *Awareness Explosion* Volume 3: Articles That Increase Your MS Word Knowledge Base., Author: Louis Ellman
Title: Project Planner: Academia & Personal Projects, Author: Sana Naeem
Title: Techno-Ready Marketing: How and Why Customers Adopt Technology, Author: Charles L. Colby
Title: The DevOps Adoption Playbook: A Guide to Adopting DevOps in a Multi-Speed IT Enterprise, Author: Sanjeev Sharma
Title: Leading for Success: Unleash your leadership potential to achieve extraordinary results, Author: Sarah Cook
Title: Flexibilitätspotenziale heben - IT-Wertbeitrag steigern: HMD Best Paper Award 2013, Author: André Wiedenhofer
Title: Von syntaktischer zu semantischer Integration, Author: Mathias Riechert
Title: Agentenbasierte Modellierung von endogenen Interaktionen, Author: Stefan Strunck
Title: Ransom War: How Cyber Crime Became a Threat to National Security, Author: Max Smeets
Title: Einsatz neuronaler Netze zur Mustererkennung, Author: Vera Vockerodt

Pagination Links