-
-91%
Enhanced Discovering Computers ©2017 (Shelly Cashman Series) 1st Edition
Access Enhanced Discovering Computers ©2017 (Shelly Cashman Series) 1st Edition Textbook now. The book is Available Online and can be Downloaded Immediately to any kind of devices.
-
-80%
A Web-Based Introduction to Programming: Essential Algorithms, Syntax, and Control Structures Using PHP, HTML, and MariaDB/MySQL Fourth Edition
Access A Web-Based Introduction to Programming: Essential Algorithms, Syntax, and Control Structures Using PHP, HTML, and MariaDB/MySQL Fourth Edition Textbook now. The book is Available Online and can be Downloaded Immediately to any kind of devices.
-
-55%
Applications of Evolutionary Computation EvoApplications 2011: EvoCOMPLEX, EvoGAMES, EvoIASP, EvoINTELLIGENCE, EvoNUM, and EvoSTOC, Torino, Italy, April 27-29, 2011, Proceedings, Part I 1st Edition
Access Applications of Evolutionary Computation EvoApplications 2011: EvoCOMPLEX, EvoGAMES, EvoIASP, EvoINTELLIGENCE, EvoNUM, and EvoSTOC, Torino, Italy, April 27-29, 2011, Proceedings, Part I 1st Edition Now. Discount up to 90%
-
-70%
Autodesk Revit Architecture 2015 Essentials: Autodesk Official Press 1st Edition
Access Autodesk Revit Architecture 2015 Essentials: Autodesk Official Press 1st Edition Now. Discount up to 90%
-
-72%
CISM Certified Information Security Manager Bundle, Second Edition 2nd Edition
Access CISM Certified Information Security Manager Bundle, Second Edition 2nd Edition Now. Discount up to 90%
-
-82%
Computational Intelligence in Software Modeling 1st Edition
Access Computational Intelligence in Software Modeling 1st Edition Now. Discount up to 90%
-
-52%
A Guide to Software Configuration Management
Access A Guide to Software Configuration Management Now. Discount up to 90%
-
-75%
Advances in Cryptology – CRYPTO 2020 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part III 1st Edition
Access Advances in Cryptology – CRYPTO 2020 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part III 1st Edition Now. Discount up to 90%
-
-88%
Handbook of System Safety and Security Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems
Access Handbook of System Safety and Security Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems Now. Discount up to 90%
-
-70%
IAPP CIPM Certified Information Privacy Manager Study Guide 1st Edition
Access IAPP CIPM Certified Information Privacy Manager Study Guide 1st Edition Now. Discount up to 90%
-
-70%
Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings
Access Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings Now. Discount up to 90%
-
-70%
Learn Type-Driven Development Benefit from type systems to build reliable and safe applications using ReasonML 3 1st Edition
Access Learn Type-Driven Development Benefit from type systems to build reliable and safe applications using ReasonML 3 1st Edition Now. Discount up to 90%
-
-66%
Pattern Recognition in Practice II
Access Pattern Recognition in Practice II Now. Discount up to 90%
-
-55%
Privacy and Identity Management. Time for a Revolution? 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers
Access Privacy and Identity Management. Time for a Revolution? 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers Now. Discount up to 90%
-
-55%
Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II
Access Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II Now. Discount up to 90%
-
-64%
RESEARCH IN COMPUTER & ROBOT VISION
Access RESEARCH IN COMPUTER & ROBOT VISION Now. Discount up to 90%