The Mythic Meanings of the Second Amendment: Taming Political ...
David C. Williams
Knowledge Representations for Planning Manipulation Tasks
Franziska Zacharias
Codex Humanus - Das Buch der Menschlichkeit Band 1-3
Thomas Chrobok
The Hidden Connections: Integrating the Biological, Cognitive, ...
Fritjof Capra
The Book of Forbidden Knowledge
Basil Le Croix
Cybersecurity Threats, Malware Trends, and Strategies: Discover ...
Tim Rains
Ethics in Information Technology: A Practical Guide
G. K. Awari & Sarvesh V. Warjurkar
Secure Edge Computing; Applications, Techniques and Challenges
Mohiuddin Ahmed & Paul Haskell-Dowland