Title: Computational Bayesian Statistics: An Introduction, Author: M. Antónia Amaral Turkman
Title: Forbidden Configurations in Discrete Geometry, Author: David Eppstein
Title: The Big6 Curriculum: Comprehensive Information and Communication Technology (ICT) Literacy for All Students: Comprehensive Information and Communication Technology (ICT) Literacy for All Students, Author: Michael B. Eisenberg
Title: 125 Problems in Text Algorithms: with Solutions, Author: Maxime Crochemore
Title: Control Theory: A Guided Tour, Author: J.R. Leigh
Title: How to Establish a Document Control System for Compliance with ISO 9001:2015, ISO 13485:2016, and FDA Requirements: A Comprehensive Guide to Designing a Process-Based Document Control System, Author: Stephanie L. Skipper
Title: Security in a Web 2.0+ World: A Standards-Based Approach, Author: Carlos Curtis Solari
Title: Causality, Probability, and Time, Author: Samantha Kleinberg
Title: RHCSA Red Hat Enterprise Linux 9 Certification Study Guide, Eighth Edition (Exam EX200), Author: Michael Jang
Title: Securing Cloud Containers: Building and Running Secure Cloud-Native Applications, Author: Sina Manavi
Title: Anti-Hacker Tool Kit, Fourth Edition, Author: Mike Shema
Title: Network Flow Algorithms, Author: David P. Williamson
Title: Computational Models for Cognitive Vision, Author: Hiranmay Ghosh
Title: Data Management Essentials Using SAS and JMP, Author: Julie Kezik
Title: Negotiation and the Global Information Economy, Author: J. P. Singh
Title: Groups, Languages and Automata, Author: Derek F. Holt
Title: Geometric and Topological Inference, Author: Jean-Daniel Boissonnat
Title: Artificial Intelligence and Social Work, Author: Milind Tambe
Title: The Mobile Application Hacker's Handbook, Author: Dominic Chell
Title: Beginning Build and Release Management with TFS 2017 and VSTS: Leveraging Continuous Delivery for Your Business, Author: Chaminda Chandrasekara

Pagination Links