Sociology And Philosophy In France Since 1945 - Death And Resurrection ...
Pierre Bourdieu & Jean-Claude Passeron
Franklin D. Roosevelt: A Life From Beginning to End (Biographies ...
Hourly History
Language and Operational Thought
Barbara Presseisen
Topics in Cognitive Development (2)
Morphophenemic Analysis of the Kannada Language
M. R. Ranganatha
The Routledge Handbook of Corpus Linguistics
Michael McCarthy & Anne O'Keeffe
The Software Developer's Guide to Linux: A Practical, No-Nonsense ...
David Cohen & Christian Sturm
Linkerd: Up and Running: A Guide to Operationalizing a Kubernetes-Native ...
Jason Morgan & Flynn
Cloud Computing: Concepts, Technology, Security, and Architecture
Thomas Erl & Eric Monroy
Security and Risk Analysis for Intelligent Edge Computing
Gautam Srivastava & Uttam Ghosh & Jerry Chun-Wei Lin
Intelligent Internet of Things Networks
Haipeng Yao & Mohsen Guizani
Wireless Networks (1)
Computer Vision and Internet of Things
Lavanya Sharma & Mukesh Carpenter
Energy Efficient Computation Offloading in Mobile Edge Computing
Ying Chen & Ning Zhang & Yuan Wu & Sherman Shen
Intensional First-Order Logic: From AI to New SQL Big Data
Zoran Majkic
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
GreenEdge: New Perspectives to Energy Management and Supply ...
Guoming Tang & Deke Guo & Kui Wu
Cloud Computing Solutions: Architecture, Data Storage, Implementation ...
Souvik Pal & Dac-Nhuong le & Prasant Kumar Pattnaik
Edge Computing and IoT: Systems, Management and Security: Second ...
Kaishun Wu & Lu Wang & Yanjiao Chen
Cybersecurity for Dummies
Joseph Steinberg
Hacking for Dummies
Kevin Beaver
Windows Server 2022 & PowerShell All-In-One for Dummies
Sara Perrott
Connectivity and Edge Computing in IoT: Customized Designs and ...
Jie Gao & Mushu Li & Weihua Zhuang
Mobile Edge Computing
Anwesha Mukherjee & Debashis de & Soumya K. Ghosh & Rajkumar Buyya
Foundation Db2 and Python: Access DB2 With Module Based API ...
W. David Ashley
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Kali Linux Penetration Testing Bible
Gus Khawaja