熱門搜尋
分類(單選) |
顯示所有篩選
|
---|---|
配送方式(可複選) | |
其他(可複選) |
搜尋結果共 150 筆, 頁數 1 / 3
呈現:
Intersexion: A Story of Faith, Identity, and Authenticity
" . . . the most compelling and informative account of the intersex experience that I have ever seen... more |
|||
Bass Clef 2: Reading, Meters and Styles
Studying the first BASS CLEF books helped us to understand the various rhythmic figures, reading the... more |
|||
The Rescue of Luminous Being
Over the course of his colorful career, Tony Vacca has created a unique blend of World Music and words that has become...... more |
|||
Alternative Modernities: Antonio Gramsci’’s Twentieth Century
Antonio Gramsci lived the Great War as a "historic break," a profound experience that left an indeli... more |
|||
Fatal Attraction: Explicit and Forbidden Erotic Short Sex Stories
|
|||
Hydraulic Fluid Power: Fundamentals, Applications, and Circuit Design
|
|||
Potential of Water Injection for Gasoline Engines by Means of a 3d-Cfd Virtual Test Bench
stoichiometric conditions over the whole engine map, even during the more power-demanding RDE cycles. Antonino Vacca presents a...... more |
|||
Ukulele. the Complete Manual
The Rhythmic figures in a simple and progressive way, in order to decode and reproduce any strumming... more |
|||
Ukulele. Theory and Ear Training
|
|||
Alternative Modernities: Antonio Gramsci’’s Twentieth Century
Antonio Gramsci lived the Great War as a "historic break," a profound experience that left an indeli... more |
|||
Solving Urban Infrastructure Problems Using Smart City Technologies: Handbook on Planning, Design, Development, and Regulation
Solving Urban Infrastructure Problems Using Smart City Technologies is the most complete guide for i... more |
|||
Bass Ukulele: The Complete Manual
|
|||
Non-Muslim Provinces Under Early Islam: Islamic Rule and Iranian Legitimacy in Armenia and Caucasian Albania
|
|||
Online Terrorist Propaganda, Recruitment, and Radicalization
Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapid... more |
|||
Freedom Calling: A Civil War Slave Escapes By Sea
|
|||
Non-Muslim Provinces under Early Islam
|
|||
Security in the Private Cloud
This comprehensive handbook serves as a professional reference and practitioner s guide to today s m... more |
|||
Guide to Wireless Network Security
Here is an authoritative, clearly presented guide to key foundation topics and technology frameworks... more |
|||
Contrition
|
|||
Legacies of Ewan MacColl: The Last Interview
Giovanni Vacca in 1987 and 1988, not long before his death, and these provide the impetus for a re-examination of his methods...... more |
|||
Resist Not Evil
This story spans forty years in the wilderness, so to speak, starting when Michael Mercurio is an ad... more |
|||
Resist Not Evil
This story spans forty years in the wilderness, so to speak, starting when Michael Mercurio is an ad... more |
|||
Managing Information Security
Managing Information Security offers focused coverage of how to protect mission critical systems, an... more |
|||
Network and System Security
Network and System Security provides focused coverage of network and system security technologies. I... more |
|||
Cyber Security and It Infrastructure Protection
This book serves as a security practitioner s guide to today s most crucial issues in cyber security... more |
|||
The Boston Jazz Chronicles
|
|||
St. Paul, the Natural Law, and Contemporary Legal Theory
St. Paul, the Natural Law, and Contemporary Legal Theory grew out of the Year of St. Paul (2008-2009... more |
|||
Practical Internet Security
As organizations increase their system links and exposure to customers, competitors, browsers, and h... more |
|||
Biometric Technologies and Verification Systems
Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters... more |
|||
Practical Internet Security
As organizations increase their system links and exposure to customers, competitors, browsers, and h... more |
|||
Guide to Wireless Network Security
Here is an authoritative, clearly presented guide to key foundation topics and technology frameworks... more |
|||
Firewalls: Jumpstart For Network And Systems Administrators
In this book, you will gain extensive hands-on experience installing and configuring a firewall. You... more |
|||
The School Law Handbook
A parent objects to a curriculum that includes a unit on Greek gods, arguing that it violates the se... more |
|||
Wireless Data Demystified
Wireless data is the high-speed transfer of e-mail, stock info, messages and even video and audio ac... more |
|||
Polarization of Light
Understanding the polarization of light is becoming increasingly important in the study of laser phy... more |
|||
The Jurisprudential Legacy of Justice Ruth Bader Ginsburg
"This edited volume brings together expert legal scholars to identify and critique jurisprudential t... more |
|||
Smart Cities Policies and Financing: Approaches and Solutions
Smart Cities Policies and Financing: Approaches and Solutions is the definitive professional referen... more |
|||
Online Terrorist Propaganda, Recruitment, and Radicalization
Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapid... more |
|||
Cloud Computing Security: Foundations and Challenges
|
|||
Pete’’s Angel: A Story of Self-Love
|
|||
Pete’’s Angel: A Story of Self-Love
|
|||
Security in the Private Cloud
|
|||
Nanoscale Networking and Communications Handbook
|
|||
Systemic Vasculitides: Current Status and Perspectives
|
|||
Mama Roo And Joey Too
|
|||
Systemic Vasculitides: Current Status and Perspectives
In spite of their relatively low prevalence, systemic vasculitides have been the object of intensive... more |
|||
An N Armenian Futuh Narrative: Lewond’s Eighth-Century History of the Caliphate
The History of the Armenian priest Lewond is an important source for the history of early Islamic ru... more |
|||
Computer Forensics: Computer Crime Scene Investigation
Despite efforts to safeguard sensitive data and networks, organizations face an ever-growing threat ... more |
|||
Legacies of Ewan MacColl: The Last Interview
|
|||
Content Area Reading: Literacy and Learning Across the Curriculum
|
|||
The Early Bronze Age III and Iva1 at Tell Mardikh/Ebla and Its Region: Stratigraphic and Ceramic Sequences
|
|||
The Edge of Freedom
|
|||
Conducting Personal Network Research: A Practical Guide
Written at an introductory level, and featuring engaging case examples, this book reviews the theory... more |
|||
Content Area Reading: Literacy and Learning Across the Curriculum
Note: This is the loose-leaf version of Content Area Reading and does not include access to the Enha... more |
|||
Content Area Reading + Pearson Enhanced Etext Access Card: Literacy and Learning Across the Curriculum
|
|||
Reading and Learning to Read
Revel(TM) is Pearson’s newest way of delivering our respected content. Fully digital and highly enga... more |
|||
Reading and Learning to Read
With a focus on helping elementary reading teachers master teaching skills that will help all childr... more |
|||
Reading and Learning to Read
|
|||
Reading and Learning to Read Revel Access Code
Revel(TM) is Pearson s newest way of delivering our respected content. Fully digital and highly enga... more |
|||
Computer and Information Security Handbook
Computer and Information Security Handbook, Third Edition, provides the most current and complete re... more |