Growing Vulnerability of the Public Switched Networks: Implications for National Security Emergency Preparedness
View more
Growing Vulnerability of the Public Switched Networks: Implications for National Security Emergency Preparedness
Principles of GNSS, Inertial, and Multi-Sensor Integrated Navigation Systems (GNSS Technology and Applications)
View more
Principles of GNSS, Inertial, and Multi-Sensor Integrated Navigation Systems (GNSS Technology and Applications)
Hands-On Spring Security 5 for Reactive Applications: Learn effective ways to secure your apps with Spring and Spring WebFlux
View more
Hands-On Spring Security 5 for Reactive Applications: Learn effective ways to secure your apps with Spring and Spring WebFlux
Programming Social Applications - Jonathan LeBlanc
View more
Programming Social Applications - Jonathan LeBlanc
Social Accounting Matrices and Multiplier Analysis: An Introduction with Excercises
View more
Social Accounting Matrices and Multiplier Analysis: An Introduction with Excercises
Industrial Applications of Machine Learning - Pedro Larrañaga
View more
Industrial Applications of Machine Learning - Pedro Larrañaga
Beginning Android 4 Application Development - Wei-Meng Lee
View more
Beginning Android 4 Application Development - Wei-Meng Lee
ASP.NET 3.5 Enterprise Application Development with Visual Studio2008 - Vince Varallo
View more
ASP.NET 3.5 Enterprise Application Development with Visual Studio2008 - Vince Varallo
Emulsion Polymerisation and Latex Applications
View more
Emulsion Polymerisation and Latex Applications
Ruby on Rails Enterprise Application Development, Plan, Program, Extend - Elliot Smith and Rob Nichols
View more
Ruby on Rails Enterprise Application Development, Plan, Program, Extend - Elliot Smith and Rob Nichols
Art and Design in Photoshop - Steve Caplin
View more
Art and Design in Photoshop - Steve Caplin
Spring Security 3.x Cookbook: Over 60 recipes to help you successfully safeguard your web applications with Spring Security
View more
Spring Security 3.x Cookbook: Over 60 recipes to help you successfully safeguard your web applications with Spring Security
Multiplier convergent series
View more
Multiplier convergent series
Hacking and Securing iOS Applications - Jonathan Zdziarski
View more
Hacking and Securing iOS Applications - Jonathan Zdziarski
Apple I Replica Creation: Back to the Garage
View more
Apple I Replica Creation: Back to the Garage
ARM Cortex M4 cookbook : over 50 hands-on recipes that will help you develop amazing real-time applications using GPIO, RS232, ADC, DAC, timers, audio codecs, graphics LCD, and a touch screen
View more
ARM Cortex M4 cookbook : over 50 hands-on recipes that will help you develop amazing real-time applications using GPIO, RS232, ADC, DAC, timers, audio codecs, graphics LCD, and a touch screen
Handbook of Computer Networks: Distributed Networks, Network Planning, Control, Management, and New Trends and Applications, Volume 3
View more
Handbook of Computer Networks: Distributed Networks, Network Planning, Control, Management, and New Trends and Applications, Volume 3