for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
The book captures the essence of the International Conference on Data... Læs mere
Bemærk: Kan ikke leveres før jul.
This handbook was developed to help researchers and practitioners select measures to be used in the... Læs mere
Bemærk: Kan ikke leveres før jul.
The Complete Guide for CISA Examination Preparation delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. Designed to help candidates pass the CISA exam easily, it also serves as an ideal on-the-job reference.
Bemærk: Kan ikke leveres før jul.
The book provides the complete strategic understanding requisite to allow... Læs mere
Bemærk: Kan ikke leveres før jul.
This two-volume handbook set introduces the state-of-the-art development in research and applications related to usability and user-experience. Volume one includes methods and techniques and volume two covers research and case studies.
Bemærk: Kan leveres før jul.
In providing an analysis of the grammar of the dialect of seven counties along the Yellow River, this two-volume set synchronically and diachronically studies the Jin dialect of China’s Northern Shaanxi Province.
Bemærk: Kan leveres før jul.
Bemærk: Kan leveres før jul.
This fully updated refresh of a popular self-published tarot deck -- now with more deluxe, more affordable... Læs mere
Bemærk: Kan ikke leveres før jul.
These two volumes on site characterization and geotechnical structures form a definitive reference and guide to databases in geotechnical and rock engineering, to enhance decision-making in geotechnical practice using data-driven methods.
Bemærk: Kan ikke leveres før jul.
This comprehensive six volume handbook establishes a new standard for spanning and integrating discussion of remote sensing principles, data,... Læs mere
Bemærk: Kan leveres før jul.
Bemærk: Kan leveres før jul.
Cognitive Hack explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security... Læs mere