Search Results

  1. 881

    Algorithms, data structures, and problem solving with C++ by WeisslhMark Allen

    Book
  2. 882

    States of war since 9/11 terrorism, sovereignty and the War on Terror

    Published 2014
    Book
  3. 883

    Terrorist transgressions gender and the visual culture of the terrorist

    Published 2014
    Book
  4. 884

    The politics of refugees in South Asia identity, resistance, manipulation by Murshid, Navine

    Published 2014
    Book
  5. 885
  6. 886

    US-UK counter-terrorism after 9/11 a qualitative approach by Tembo, Edgar B.

    Published 2014
    Book
  7. 887

    Design of coaxial double rotor helicopter for unmanned aerial vehicle application by Izzatikhmal Dzulhelmi Dzulkflee

    Published 2014
    Thesis Book
  8. 888

    Encyclopedia of information science and technology

    Published 2015
    Book
  9. 889

    Unified communications forensics anatomy of common UC attacks by Grant, Nicholas, 1978-, Shaw, Joseph W. II 1976-

    Published 2013
    Book
  10. 890
  11. 891

    Network convergence Ethernet applications and next generation packet transport architectures by Joseph, Vinod

    Published 2014
    Book
  12. 892

    Creating training miracles by Rylatt

    Published 1997
    Book
  13. 893

    Menongkah lumrah by Azmah Nordin

    Published 1996
    Book
  14. 894

    Information protection playbook

    Published 2013
    Book
  15. 895

    Surveillance and threat detection prevention versus mitigation by Kirchner, Richard, Jr

    Published 2014
    Book
  16. 896

    Data warehousing in the age of big data by Krishnan, Krish

    Published 2013
    Book
  17. 897
  18. 898

    Malware forensics field guide for Linux systems digital forensics field guides by Malin, Cameron H

    Published 2014
    Book
  19. 899

    Cloud computing theory and practice by Marinescu, Dan C.

    Published 2013
    Book
  20. 900