Introduction to Online Payments Risk Management - Ohad Samet
View more
Introduction to Online Payments Risk Management - Ohad Samet
Introduction to Metrology Applications in IC Manufacturing(集成电路制造的计量应用导论(丛书))
View more
Introduction to Metrology Applications in IC Manufacturing(集成电路制造的计量应用导论(丛书))
MST209 - Mathematical Methods and Models - Block 6
View more
MST209 - Mathematical Methods and Models - Block 6
WEB3: What Is Web3? Potential of Web 3.0 (Token Economy, Smart Contracts, DApps, NFTs, Blockchains, GameFi, DeFi, Decentralized Web, Binance, Metaverse Projects, Web3.0 Metaverse Crypto guide, Axie)
View more
WEB3: What Is Web3? Potential of Web 3.0 (Token Economy, Smart Contracts, DApps, NFTs, Blockchains, GameFi, DeFi, Decentralized Web, Binance, Metaverse Projects, Web3.0 Metaverse Crypto guide, Axie)
Engineering Calculations with Creo Parametric and PTC Mathcad Prime (Creo Power Users)
View more
Engineering Calculations with Creo Parametric and PTC Mathcad Prime (Creo Power Users)
Software Telemetry - Jamie Riedesel
View more
Software Telemetry - Jamie Riedesel
Audio- and Video-Based Biometric Person Authentication: Third International Conference, AVBPA 2001 Halmstad, Sweden, June 6–8, 2001 Proceedings
View more
Audio- and Video-Based Biometric Person Authentication: Third International Conference, AVBPA 2001 Halmstad, Sweden, June 6–8, 2001 Proceedings
Digital Computer Arithmetic Datapath Design Using Verilog HDL
View more
Digital Computer Arithmetic Datapath Design Using Verilog HDL
Drug interdiction: partnerships, legal principles, and investigative methodologies for law enforcement
View more
Drug interdiction: partnerships, legal principles, and investigative methodologies for law enforcement
从实践中学习Metasploit 5渗透测试
View more
从实践中学习Metasploit 5渗透测试
Negative-refraction metamaterials
View more
Negative-refraction metamaterials
Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, ... Networks and Telecommunications)
View more
Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, ... Networks and Telecommunications)
Head First 2D Geometry
View more
Head First 2D Geometry
Alexei Panshin - Sons of Prometheus
View more
Alexei Panshin - Sons of Prometheus
Neural Cell Transplantation: Methods and Protocols
View more
Neural Cell Transplantation: Methods and Protocols
Linux系统管理技术手册(第二版) - Evi Nemeth, Garth Snyder and Trent R. Hein
View more
Linux系统管理技术手册(第二版) - Evi Nemeth, Garth Snyder and Trent R. Hein
Effective Methods for Software Testing 3rd Edition - William E. Perry
View more
Effective Methods for Software Testing 3rd Edition - William E. Perry