How to Manage Risk in an Era of Explosive Unstructured Data ...
dryvIQ
A Dictionary of Sources of Tolkien
David Day
Borrowed Morphology
Francesco Gardani & Nino Amiridze & Peter Arkadiev
Language Contact and Bilingualism [LCB] (7)
Vulnerability in Resistance
Judith P. Butler & Zeynep Gambetti & Leticia Sabsay
Artificial Intelligence-Based Internet of Things Systems
Rajkumar Buyya & Debashis de & Souvik Pal
History of Western Philosophy
Nigel Tubbs
Cold War Counterfeit Spies: Tales of Espionage - Genuine or ...
Nigel West
Spycraft Secrets: An Espionage A-Z
MI5
The a to Z of Sexspionage
Priests, Prophets and Scribes: Essays on the Formation and Heritage ...
Joseph Blenkinsopp & Eugene Ulrich
Historical Dictionary of World War II Intelligence
MI5 in the Great War
Double Cross in Cairo
Operation Garbo
The a to Z of British Intelligence
The A to Z Guide Series (1)
The Guy Liddell Diaries Vol. II: 1942-1945
Guy Maynard Liddell
The Kompromat Conspiracy: The Truth About the Trump Dossier
Snow
Nigel West & Madoc Roberts
Ternary Phase Diagrams in Materials Science
David Richard Frederick West & Nigel Saunders
The Atlas of Mysterious Places: The World's Unexplained Sacred ...
Jennifer Westwood
Hitler's Espionage Machine
Christer Jörgensen
Army GI, Pacifist CO: The World War II Letters of Frank and ...
Frank Dietrich & Albert Dietrich
Q&A for Deepak
Fred Alan Wolf
Die Organisation des Wissens: Wie japanische Unternehmen eine ...
Ikujiro Nonaka & Hirotaka Takeuchi