Top 1200 rui andrade and nerio amboni auth PDF Book Page 48

book image

Applied Network Security Monitoring. Collection, Detection, and Analysis

Chris Sanders and Jason Smith (Auth.)
·476 Pages
·2014
·37.36 MB

book image

Composite Steel and Concrete Structural Members. Fundamental Behaviour

D.J. Oehlers and M.A. Bradford (Auth.)
·564 Pages
·1995
·15.972 MB

book image

Mathematics for Stability and Optimization of Economic Systems

Yasuo Murata and Karl Shell (Auth.)
·424 Pages
·1977
·15.383 MB

book image

Finance. Financial Data of Banks and Other Institutions

K. Phylaktis and G. Kaye (Auth.)
·479 Pages
·1987
·21.939 MB

book image

Energy Optimization in Process Systems and Fuel Cells

Stanislaw Sieniutycz and Jacek Jezowski (Auth.)
·800 Pages
·2013
·12.725 MB

book image

Stuck Together (Pea, Bee, and Jay #1)

Brian and
·66 Pages
·2020
·21 MB

book image

Surviving the Future. Academic Libraries, Quality and Assessment

Gail Munde and Kenneth Marks (Auth.)
·205 Pages
·2009
·1.195 MB

book image

Petroleum Rock Mechanics. Drilling Operations and Well Design

Bernt Aadnoy and Reza Looyeh (Auth.)
·359 Pages
·9.102 MB

book image

Records Management for Museums and Galleries. An Introduction

Charlotte Brunskill and Sarah Demb (Auth.)
·264 Pages
·2012
·12.149 MB

book image

Practical TCP/IP and Ethernet Networking for Industry

Deon Reynders and Edwin Wright (Auth.)
·308 Pages
·2003
·13.232 MB

book image

Introduction to Engineering Design. Modelling, Synthesis and Problem Solving Strategies

Andrew Samuel and John Weir (Auth.)
·406 Pages
·2000
·16.972 MB

book image

Biochemistry and Oral Biology

A. S. Cole and J. E. Eastoe (Auth.)
·560 Pages
·1988
·36.222 MB

book image

Targeted Cyber Attacks. Multi-staged Attacks Driven by Exploits and Malware

Aditya Sood and Richard Enbody (Auth.)
·146 Pages
·2014
·5.51 MB

book image

Inter-cooperative Collective Intelligence: Techniques and Applications

Artur Arsénio, Hugo Serra, Rui Francisco (auth.), Fatos Xhafa, Nik Bessis (eds.)
·444 Pages
·2014
·8.732 MB

book image

Insider Threat. Protecting the Enterprise from Sabotage, Spying, and Theft

Eric Cole and Sandra Ring (Auth.)
·388 Pages
·2005
·21.183 MB

book image

Pollution Control and Resource Recovery. Municipal Solid Wastes at Landfill

Zhao Youcai and Lou Ziyang (Auth.)
·388 Pages
·2016
·32.577 MB