The Woman Who Wouldn't Explain: Saskia's Search
Saaskia Aark-Bennett
Practical Domain-Driven Design in Enterprise Java: Using Jakarta ...
Vijay Nair
The Oxford Handbook of Leadership and Organizations
David V. Day
Applied Data Science With Python and Jupyter
Alex Galea
If the Universe Is Teeming With Aliens ... WHERE IS EVERYBODY?
Stephen Webb
Science and Fiction (1)
Understanding Autonomous Cooperation and Control in Logistics: ...
Michael Hülsmann & Katja Windt
Knowledge Representation for Health-Care. Data, Processes and ...
David Riano & Annette Ten Teije & Silvia Miksch & Mor Peleg
Wie Managed-Service-P[..] gelingen: Eine Einführung
Roland Walther & Hans Joachim Hoppe
Product Lifecycle Management (Volume 7): PLM and Digital Twins
John Stark
Data Science for Entrepreneurship: Principles and Methods for ...
Werner Liebregts & Willem-Jan van Den Heuvel & Arjan van Den Born
Data Engineering: Mining, Information and Intelligence
Yupo Chan & John Talburt & Terry M. Talley
Achieving DevOps: A Novel About Delivering the Best of Agile, ...
Dave Harrison & Knox Lively
Principles of Data Science
Hamid R. Arabnia & Kevin Daimi & Robert Stahlbock & Cristina Soviany & Leonard Heilig & Kai Brüssau
Beyond AI: ChatGPT, Web3, and the Business Landscape of Tomorrow
Ken Huang & Yang Wang & Feng Zhu & Xi Chen & Chunxiao Xing
Windows Group Policy Troubleshooting: A Best Practice Guide ...
Kapil Arya
Mastering Azure API Management: A Practical Approach to Designing ...
Sven Malvik
Foundation Db2 and Python: Access DB2 With Module Based API ...
W. David Ashley
Design Thinking Research: Looking Further: Design Thinking Beyond ...
Christoph Meinel & Larry Leifer
Business Model Innovation in the Era of the Internet of Things: ...
Jan F. Tesch
Demystifying Internet of Things Security: Successful IoT Device/Edge ...
Sunil Cheruvu & Anil Kumar & Ned Smith & David M. Wheeler
Internet of Things (IoT): Concepts and Applications
Mansaf Alam & Kashish Ara Shakil & Samiya Khan
The Cloud-To-Thing Continuum: Opportunities and Challenges in ...
Theo Lynn & John G. Mooney & Brian Lee & Patricia Takako Endo
Trusted Computing: Ein Weg zu neuen IT-Sicherheitsarc[..]
Norbert Pohlmann & Helmut Reimer
Content Delivery Networks
Rajkumar Buyya & Mukaddim Pathan & Athena Vakali
Enterprise Ontology: Theory and Methodology
Jan Dietz