Fuzzy Mathematical Programming and Fuzzy Matrix Games
C. R. Bector & Suresh Chandra
The Counterfeit Agent
Alex Berenson
John Wells (8)
Python Data Persistence
Malhar Lathkar
Hacking: 3 Books in 1: A Beginners Guide for Hackers (How to ...
Julian James McKinnon
Decoding the Secrets of Egyptian Hieroglyphs Lectures 1-12 and ...
Bob Brier
Practical Security for Agile and DevOps
Mark S. Merkow