انتشارات Pmph Inc
The Data Processing Security Game. Safeguarding Against the Real Dangers of Computer Abuse
Robert S. Becker (Auth.), 1977
Systems Approaches in Computer Science and Mathematics. Proceedings of the International Congress on Applied Systems Research and Cybernetics
Mexico) International Congress on Applied Systems Research, 1981
Technology for Underdeveloped Areas. An Annotated Bibliography
Jack Baranson (Auth.), 1967
Submicroscopic Structure of the Inner Ear
Salvatore Iurato (Auth.), 1967
Treatments from Toxins: The Therapeutic Potential of Clostridial Neurotoxins
Keith Alan Foster, 2006
Small-Group Cultures
Tom McFeat, 1974
Theory of Structures, 2nd Ed.
Stephen Timoshenko, 1965
Separation of Flow
Paul K. Chang (Auth.), 1970
Theory and Problems of Theoretical Mechanics (Schaum's Outline)
Murray R. Spiegel, 1977
Theory of equations
James Victor Uspensky, 1963
Theory and applications of electron tubes
Herbert J Reich, 1944
The Slave Trade and the Origins of International Human Rights Law
Jenny S. Martinez, 2012
The Universal Machine with CDROM: A Multimedia Introduction to Computing
Glenn Blank, 1997
Mythology
James Weigel, 1973
Power Sources. Research and Development in Non-Mechanical Electrical Power Sources
D. H. Collins (Eds.), 1967
Pitfalls in Human Research. Ten Pivotal Points
Theodore Xenophon Barber, Arnold P. Goldstein, 1976
Photochemistry of Proteins and Nucleic Acids
A. D. McLaren, D. Shugar, P. Alexander, 1964
The Tomes of Delphi Algorithms and Data Structures
Julian Bucknall, 2001
The Tomes of Delphi: Algorithms and Data Structures
Julian Bucknall, 2001
The Thermodynamics of Electrical Phenomena in Metals and a Condensed Collection of Thermodynamic Formulas
Percy Williams Bridgman, 1979
