Risikomanagement der Gefahrgutbeförder[..] Einsatzpotential ...
Michael Huth
Certified Kubernetes Security Specialist (CKS) Study Guide
Benjamin Muschko
Learning to See: Value Stream Mapping to Add Value and Eliminate ...
John Shook & Mike Rother & Jim Womack & Dan Jones
Risikomanagement im Kontext der wertorientierten Unternehmensführung
Klaus Wolf
The Western Abenakis of Vermont, 1600-1800: War, Migration, ...
Colin G. Calloway
Artificial Intelligence for Cloud and Edge Computing
Sanjay Misra & Amit Kumar Tyagi & Vincenzo Piuri & Lalit Garg
Artificial Intelligence and Machine Learning for EDGE Computing
Rajiv Pandey & Sunil Kumar Khatri & Neeraj Kumar Singh & Parul Verma
Approximate Computing
Weiqiang Liu & Fabrizio Lombardi
Anti-Computing: Dissent and the Machine
Caroline Bassett
Analog Computing
Bernd Ulmann
Affective Computing
Rosalind W. Picard
Aesthetic Computing
Paul A. Fishwick
Advanced Computing
Michael Bader & Hans-Joachim Bungartz & Tobias Weinzierl
5G IoT and Edge Computing for Smart Healthcare
Bhoi, Akash Kumar;de Albuquerque, Victor Hugo Costa;Sur, Samarendra ...
How to Kill Website Relaunch
Pantheon
John Cage and Buddhist Ecopoetics: John Cage and the Performance ...
Peter Jaeger
John Dewey’s Philosophy of Education: An Introduction and Recontextualization ...
Jim Garrison & Stefan Neubert & Kersten Reich
Modernize your CI-CD
GitLab
Micronations and the Search for Sovereignty
Harry Hobbs & George Williams
The Encyclopedia of Leadership: A Practical Guide to Popular ...
Murray Hiebert & Bruce Klatt
Mathematical Methods for Physicists - Solutions Manual
George B. Arfken & Hans J. Weber & Frank E. Harris
Make Your Brand Matter: Experience-Driven Solutions to Capture ...
Steven G. Soechtig
Lectures to My Students
Charles H. Spurgeon
Leadership Skills
Aneeka Patel
Ireland: The Propaganda War
Liz Curtis