Gesammelte Werke: Märchen + Romane + Erzählungen + Gedichte: ...
Wilhelm Hauff
Turning Ethics Into Outcomes: Three Steps to Build “Integrity ...
Corporate Executive Board
Addiction Neuroethics: The Promises and Perils of Neuroscience ...
Adrian Carter & Wayne Hall
The Story of the World - Volume 1: Ancient Times (Revised)
Susan Wise Bauer
History for the Classical Child (1)
Knative Cookbook: Building Effective Serverless Applications ...
Burr Sutter & Kamesh Sampath
Incentive-Centric Semantic Web Application Engineering
Elena Simperl & Roberta Cuel & Martin Stein
Humanities Computing
Willard McCarty
High-Performance Computing Applications in Numerical Simulation ...
Changjun Hu & Wen Yang & Congfeng Jiang & Dong Dai
Head First Networking
Al Anderson & Ryan Benedetti
Head First (1)
Hands-On RESTful API Design Patterns and Best Practices: Design, ...
Harihara Subramanian & Pethuru Raj
Hacking for Dummies
Kevin Beaver
Guide to TCP/IP: IPv6 and IPv4
James Pyles & Jeffrey L. Carrell & Ed Tittel
Grid Economics and Business Models: 6th International Workshop, ...
Jörn Altmann & Rajkumar Buyya & Omer F. Rana
Grid Computing: Second European AcrossGrids Conference, AxGrids ...
Marios D. Dikaiakos
GreenEdge: New Perspectives to Energy Management and Supply ...
Guoming Tang & Deke Guo & Kui Wu
Graph Structures for Knowledge Representation and Reasoning: ...
Michael Cochez & Madalina Croitoru & Pierre Marquis & Sebastian Rudolph
Madalina Croitoru & Pierre Marquis & Sebastian Rudolph & Gem Stapleton
Fuzzy Control of Queuing Systems
Runtong Zhang & Yannis A. Phillis & Vassilis S. Kouikoglou
Foundations of Python Network Programming: The Comprehensive ...
John Goerzen & Tim Bower & Brandon Rhodes
Foundation Db2 and Python: Access DB2 With Module Based API ...
W. David Ashley
Forensic Computing
A. J. Sammes & Brian Jenkinson
Fog/Edge Computing for Security, Privacy, and Applications
Wei Chang & Jie Wu
Fog, Edge, and Pervasive Computing in Intelligent IoT Driven ...
Deepak Gupta & Aditya Khamparia