Schaum's Outline of Complex Variables, 2ed
Seymour Lipschutz & Murray Spiegel & John Schiller & Dennis Spellman
Teaching English as a Foreign Language
Geoffrey Broughton & Christopher Brumfit
The Return of History and the End of Dreams
Robert Kagan
Create GUI Applications With Python & Qt6 : The Hands-On Guide ...
Martin Fitzpatrick
Agent-Centered Morality: An Aristotelian Alternative to Kantian ...
George W. Harris
Internet of Things
Constandinos X. Mavromoustakis & George Mastorakis & Jordi Mongay Batalla
Modeling and Optimization in Science and Technologies (4)
Internet of Things (IoT): Concepts and Applications
Mansaf Alam & Kashish Ara Shakil & Samiya Khan
Innovations in the Industrial Internet of Things and Smart Factory
Sam Goundar
Industry 4.0: The Industrial Internet of Things
Alasdair Gilchrist
Game Theory, the Internet of Things and 5G Networks: Utilizing ...
Josephina Antoniou
Internet of Things a to Z: Technologies and Applications
Qusay F. Hassan
Practical IoT Hacking: The Definitive Guide to Attacking the ...
Fotios Chantzis & Ioannis Stais & Paulino Calderon & Evangelos Deirmentzoglou & Beau Woods
Programming the Internet of Things: An Introduction to Building ...
Andy King
RFID Technologies for Internet of Things
Min Chen & Shigang Chen
Marjorie Taylor Greene: A Detailed Life Story
Oliver Taylor
BE HUMAN: Essays on Countering Transhuman Self-Destruction
Joe Doran
The War for Natural Humanity (3)
Simple Chord-Style Piano With LRPCN Chord Notation: A Left-Hand ...
Programming With TensorFlow: Solution for Edge Computing Applications
Kolla Bhanu Prakash & G. R. Kanagachidambaresan
Tech Trends: 2021 Simple Guide for Future Technologies. AI, ...
Scott Hubbard
The Cloud-To-Thing Continuum: Opportunities and Challenges in ...
Theo Lynn & John G. Mooney & Brian Lee & Patricia Takako Endo
Understanding Infrastructure Edge Computing: Concepts, Technologies, ...
Alex Marcham
Urban Computing
Yu Zheng
Unconventional Computing: A Volume in the Encyclopedia of Complexity ...
Andrew Adamatzky
Ubiquitous Computing
Eduard Babkin
Trusted Computing: Ein Weg zu neuen IT-Sicherheitsarc[..]
Norbert Pohlmann & Helmut Reimer