Social Engineering Attack
Gunikhan Sonowal
5,000 Most-Used Shorthand Forms: The 5,000 Words of Highest ...
Winifred Kenna Richmond
Memory in Augustine's Theological Anthropology
Paige E. Hochschild
APIs For Dummies®, 3rd IBM Limited Edition
Dennis Ashby & Claus T. Jensen
Alfred Nobel: A Life from Beginning to End (Biographies of Inventors)
Hourly History
Murach's Python Programming: Beginner to Pro
Joel Murach
MySQL Connector/Python Revealed
Jesper Wisborg Krogh
Natural Language Processing and Information Systems: 10th International ...
Andrés Montoyo & Rafael Munoz & Elisabeth Métais
Natural Language Processing and Information Systems: 11th International ...
Christian Kop & Günther Fliedl & Heinrich C. Mayr & Elisabeth Métais
Natural Language Processing and Information Systems: 12th International ...
Zoubida Kedad & Nadira Lammari & Elisabeth Métais & Farid Meziane & Yacine Rezgui
Natural Language Processing and Information Systems: 5th International ...
Mokrane Bouzeghoub & Zoubida Kedad & Elisabeth Metais
Natural Language Processing and Information Systems: 6th International ...
Birger Andersson & Maria Bergholtz & P. Johannesson
Natural Language Processing Recipes: Unlocking Text Data with ...
Akshay Kulkarni & Adarsha Shivananda
Natural Language Processing – IJCNLP 2004: First International ...
Keh-Yih Su & Jun'Ichi Tsujii & Jong-Hyeok Lee & Oi Yee Kwong
Natural Language Processing – IJCNLP 2005: Second International ...
Robert Dale & Kam-Fai Wong & Jian Su & Oi Yee Kwong
The Nexus Framework for Scaling Scrum
Kurt Bittner & Patricia Kong & Dave West
Node. Js 8 The Right Way: Practical, Server-Side Javascript ...
Jim Wilson