Ursprung und Hintergrund seiner Lehre
John G. Bennett
Tree Models of Similarity and Association
James E. Corter
Five Insider Secrets to Leadership That Delivers
Brad Cleaveland
The Adventure of Silver Blaze
Arthur Conan Doyle
canon of Sherlock Holmes (120)
Too big to know: das Wissen neu denken, denn Fakten sind keine ...
David Weinberger
Secure Edge Computing; Applications, Techniques and Challenges
Mohiuddin Ahmed & Paul Haskell-Dowland
Ethics in Information Technology: A Practical Guide
G. K. Awari & Sarvesh V. Warjurkar
Cybersecurity Threats, Malware Trends, and Strategies: Discover ...
Tim Rains