Implementing an Information Security Management System: Security ...
Abhishek Chopra & Mukund Chaudhary
(In)VISIBLE: Learning to Act in the Metaverse
Stefan Sonvilla-Weiss
Mark Twain at Bayreuth
Mark Twain
The Tree of Gnosis: Gnostic Mythology From Early Christianity ...
Ioan P. Culianu
2 Corinthians (TTCS)
Moyer V. Hubbard
Teach the Text Commentary Series (3)
Istio: Up and Running: Using a Service Mesh to Connect, Secure, ...
Lee Calcote & Zack Butcher
Virtual Storytelling. Using Virtual Reality Technologies for ...
Marc Cavazza & Stéphane Donikian
Data Engineering: Mining, Information and Intelligence
Yupo Chan & John Talburt & Terry M. Talley
Fog/Edge Computing for Security, Privacy, and Applications
Wei Chang & Jie Wu
Graph-based Knowledge Representation: Computational Foundations ...
Michel Chein & Marie L. Mugnier
Information Visualization: Beyond the Horizon
Chaomei Chen
RFID Technologies for Internet of Things
Min Chen & Shigang Chen
Content Computing: Advanced Workshop on Content Computing, AWCC ...
Chi-Hung Chi & Kwok-Yan Lam
Linux in Action
David Clinton
Graph Structures for Knowledge Representation and Reasoning: ...
Michael Cochez & Madalina Croitoru & Pierre Marquis & Sebastian Rudolph
The Software Developer's Guide to Linux: A Practical, No-Nonsense ...
David Cohen & Christian Sturm
Overview of the PMBOK® Guide: Short Cuts for PMP® Certification
Deasún Ó Conchúir
Fuzzy Modeling and Genetic Algorithms for Data Mining and Exploration
Earl Cox
Madalina Croitoru & Pierre Marquis & Sebastian Rudolph & Gem Stapleton
Natural Language Processing – IJCNLP 2005: Second International ...
Robert Dale & Kam-Fai Wong & Jian Su & Oi Yee Kwong
Effective DevOps: Building a Culture of Collaboration, Affinity, ...
Jennifer Davis & Katherine Daniels
Business Process Management: 7th International Conference, BPM ...
Umeshwar Dayal & Johann Eder & Jana Koehler & Hajo A. Reijers
Mastering PowerShell Scripting - Fifth Edition: Automate Repetitive ...
Chris. Dent