انتشارات Dev Sco Publications

Wireless Mesh Networking: Architectures, Protocols and Standards (Wireless Networks and Mobile Communications)
Yan Zhang, Jijun Luo, Honglin Hu, 2006
Essential German Grammar (Dover Language Guides Essential Grammar)
Guy Stern, E. F. Bleiler, 1961
The Integrative Power of Cognitive Therapy: An Integration of Contemporary Theory and Therapy
Brad A. Alford PhD, Aaron T. Beck MD, 1997
850 Calligraphic Ornaments for Designers and Craftsmen
Kiyoshi Takahashi, 2012
Dynamics of Fluids in Porous Media
Bear, Jacob, 1972
Dynamics of Fluids in Porous Media
Bear, Jacob, 1972
Practical hacking techniques and countermeasures
Mark D. Spivey, 2006
Practical hacking techniques and countermeasures
Mark D. Spivey, 2006
Profiling hackers: the science of criminal profiling as applied to the world of hacking
Raoul Chiesa, Stefania Ducci, Silvio Ciappi, 2008
Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking
Raoul Chiesa, Stefania Ducci, Silvio Ciappi, 2008
Ethnography: Step-by-Step
David M. Fetterman, 1997
Ethnography: Step-by-Step
David M. Fetterman, 2009
Nonlinear Mechanics: A Supplement to Theoretical Mechanics of Particles and Continua
Alexander L. Fetter, John Dirk Walecka, 2006
Quantum Theory of Many-Particle Systems
Alexander L. Fetter, John Dirk Walecka, Physics, 2003
Theoretical mechanics of particles and continua
Alexander L.Fetter, John D.Walecka, 2003
Securing and controlling Cisco routers
Peter T. Davis, 2002
Securing and controlling Cisco routers
Peter T. Davis, 2002
A Drop Around the World
Barbara Shaw McKinney,Michael S. Maydak, 2012
Osprey Combat Aircraft 073 B-26 Marauder Units of the MTO
Mark Styling, 2008
Machine Learning in Action
Peter Harrington, 2012
Introducing Data Science: Big Data, Machine Learning, and more, using Python tools
Davy Cielen, Arno Meysman, Mohamed Ali, 2016
Introducing Data Science: Big Data, Machine Learning, and more, using Python tools
Davy Cielen, Arno Meysman, Mohamed Ali, 2016
Construction Program Management
Joseph Delaney, 2013
Information Security Risk Analysis
Thomas R. Peltier, 2005