Warning: file_put_contents(cache/omni_cce08c8f66f2376d71e3bafa19baaa27.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
The Coder's Apprentice
Learning Programming with Python 3...
View Book →
Re/Assembling the Pregnant and Parenting Teenager
Narratives from the field(s)...
View Book →
What's the Future of Work?
Exploring the Economic Shift Led by Software and Connectedness...
View Book →
Teacher Transition into Innovative Learning Environments
A Global Perspective...
View Book →
TensorFlow Roadmap
Mastering the TensorFlow by knowing where to start...
View Book →
Professor Frisby's Mostly Adequate Guide to Functional Programming
...
View Book →
Deploying Windows 10
Automating deployment by using System Center Configuration Manager...
View Book →
JavaScript Allongé
Programming from Functions to Classes in ECMAScript 2015...
View Book →
New Frontiers in Social Innovation Research
...
View Book →
Communicating Science
A Global Perspective...
View Book →
Libelf by Example
A tutorial introduction to the ELF(3) & GELF(3) APIs...
View Book →
Digital Technology and the Practices of Humanities Research
...
View Book →
The Governing-Evaluation-Knowledge Nexus
Swedish Higher Education as a Case...
View Book →
Target Suitability and the Crime Drop
...
View Book →
25 Secrets for Faster ASP.NET Applications
...
View Book →
The GEO Handbook on Biodiversity Observation Networks
...
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →
Sensing Absence: How to See What Isn't There in the Study of Science and Security
...
View Book →
Rethinking the Internet of Things
A Scalable Approach to Connecting Everything...
View Book →
Policy-Oriented Technology Assessment Across Europe: Expanding Capacities
...
View Book →
Reconsidering Constitutional Formation I National Sovereignty
A Comparative Analysis of the Juridification by Constitution...
View Book →
Aging Well
Solutions to the Most Pressing Global Challenges of Aging...
View Book →
Data-Driven Policy Impact Evaluation
How Access to Microdata is Transforming Policy Design...
View Book →
Tellings and Texts
Music, Literature and Performance in North India...
View Book →
The South Texas Health Status Review
A Health Disparities Roadmap...
View Book →
Radiation Monitoring and Dose Estimation of the Fukushima Nuclear Accident
...
View Book →
Connectionist Representations of Tonal Music
Discovering Musical Patterns by Interpreting Artificial Neural Networks...
View Book →
Simplified Signs, Volume 1
A Manual Sign-Communication System for Special Populations...
View Book →
Romanticism and Time
Literary Temporalities...
View Book →
Regulating Content on Social Media
Copyright, Terms of Service and Technological Features...
View Book →
Open Workbook of Cryptology
A project-based introduction to crypto in Python...
View Book →
Open Government
Collaboration, Transparency, and Participation in Practice...
View Book →
Geographic Citizen Science Design
No one left behind...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →
Fallibility at Work
Rethinking Excellence and Error in Organizations...
View Book →
History and Cultural Memory in Neo-Victorian Fiction
Victorian Afterimages...
View Book →
From Family to Philosophy
Letter-Writers from the Pastons to Elizabeth Barrett Browning...
View Book →
Game Hacking Academy
A Beginner's Guide to Understanding Game Hacking Techniques...
View Book →
Certified Programming with Dependent Types
A Pragmatic Introduction to the Coq Proof Assistant...
View Book →
Drinking in Victorian and Edwardian Britain
Beyond the Spectre of the Drunkard...
View Book →
The Haskell School of Music
From Signals to Symphonies...
View Book →
Control Theory Tutorial
Basic Concepts Illustrated by Software Examples...
View Book →
Non-Vitamin K Antagonist Oral Anticoagulants
A Concise Guide...
View Book →
The European Landing Obligation
Reducing Discards in Complex, Multi-Species and Multi-Jurisdictional Fisheries...
View Book →
Configuring Microsoft SharePoint Hybrid Capabilities
...
View Book →
Defense against the Black Arts
How Hackers Do What They Do and How to Protect against It...
View Book →
Why Should I Care? Mobile Security for The Rest of Us
10 Simple Things You Can Do to Protect Yourself and Your Organization from Today's Mobile Computing Threats...
View Book →