انتشارات Iris Press
Adenovirus: Methods and Protocols
Rosa Menéndez-Conejero, Ana J. Pérez-Berná, Gabriela N. Condezo (auth.), Miguel Chillón, Assumpció Bosch (eds.), 2014
Advances in Forensic Human Identification
Xanthé Mallett; Teri Blythe; Rachel Berry, 2014
Algebra through practice. Rings, fields and modules
T. S. Blyth, E. F. Robertson, 1985
Presidential Debates
Alan Schroeder, 2000
Presidential Debates: Forty Years of High-Risk TV
Alan Schroeder, 2000
Blood And Homeland: Eugenics And Racial Nationalism in Central And Southeast Europe, 1900-1940
Paul Weindling, Marius Turda, 2007
Blood And Homeland: Eugenics And Racial Nationalism in Central And Southeast Europe, 1900-1940
Paul Weindling, Marius Turda, 2007
Applied Multivariate Statistics With SAS Software
Ravindra Khattree, Dayanand N. Naik, 2000
Performance Testing Guidance for Web Applications
Microsoft Corporation, 2007
Performance Testing Microsoft .NET Web Applications
MICROSOFT ACE TEAM, 2002
CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits
James S. Tiller, 2011
Ethical Hacking and Penetration Testing Guide
Rafay Baloch, 2014
Chromosome Nanoscience and Technology
Kiichi Fukui, Tatsuo Ushiki, 2008
Chromosome Nanoscience and Technology
Kiichi Fukui, Tatsuo Ushiki, 2007
Encyclopedia of Nanoscience and Nano Technology
Hari Singh Nalwa, 2004
Foundations of Nanotechnology, Volume Two: Nanoelements Formation and Interaction
Sabu Thomas, Saeedeh Rafiei, Shima Maghsoodlou, Arezo Afzali, 2014
Foundations of Nanotechnology. Volume 3, Mechanics of Carbon Nanotubes
Rafiei, Saeedeh, 2015
Cooperating Rivals: The Riparian Politics of the Jordan River Basin
Jeffrey K. Sosland, 2008
Governing Out of Order: Space, Law and the Politics of Belonging
Davina Cooper, 1998
Safety and reliability of bridge structures
Khaled M Mahmoud
