Title: Zero Trust Security: An Enterprise Guide, Author: Jason Garbis
Title: Z: An Introduction to Formal Methods, Author: Antoni Diller
Title: Your Code as a Crime Scene, Second Edition: Use Forensic Techniques to Arrest Defects, Bottlenecks, and Bad Design in Your Programs, Author: Adam Tornhill
Title: You Can't Teach Us if You Don't Know Us and Care About Us: Becoming an Ubuntu, Responsive and Responsible Urban Teacher, Author: Omiunota Nelly Ukpokodu
Title: XML Databases and the Semantic Web, Author: Bhavani Thuraisingham
Title: X-Machines for Agent-Based Modeling: FLAME Perspectives, Author: Mariam Kiran
Title: Writing for Computer Science, Author: Justin Zobel
Title: Workload Measures, Author: Valerie Jane Gawron
Title: Workload Characterization for Computer System Design, Author: Lizy Kurian John
Title: Workload Automation Using HWA: With Architecture and Deployment Options, Author: Navin Sabharwal
Title: WORKING WITH grep, sed, AND awk Pocket Primer, Author: Oswald Campesato
Title: Workflow Scheduling on Computing Systems, Author: Kenli Li
Title: Workflow Management Systems and Interoperability, Author: Asuman Dogac
Title: Women in Game Development: Breaking the Glass Level-Cap, Author: Jennifer Brandes Hepler
Title: Wittgenstein, Language and Information: Back to the Rough Ground!, Author: David Blair
Title: Wireless Power Transfer Algorithms, Technologies and Applications in Ad Hoc Communication Networks, Author: Sotiris Nikoletseas
Title: Wired/Wireless Internet Communications: 5th International Conference, WWIC 2007, Coimbra, Portugal, May 23-25, 2007, Proceedings, Author: Fernando Boavida
Title: Wired and Mobilizing: Social Movements, New Technology, and Electoral Politics, Author: Victoria Carty
Title: Winning Together: A UX Researcher's Guide to Building Strong Cross-Functional Relationships, Author: Sonal Srivastava
Title: Winning the SoC Revolution: Experiences in Real Design, Author: Grant Martin

Pagination Links