213339 |
|
Howard B. Levine |
The Freudian Matrix of André Green |
2023 | •• |
128764 |
|
Howard B. Wilson, Louis H. Turcotte, David Halpern |
Adv Math Mech App using MatLab Book |
2003 • | •• |
149662 |
|
Howard Berg R., Christopher G. Taylor |
Cell Biology of Plant Nematode Parasitism |
2008 • | •• |
123085 |
|
Howard C.D., Newman C.M. |
The Percolation Transition for the Zero-Temperature Stochastic Ising Model on the Hexagonal Lattice |
2003 | •• |
148976 |
|
Howard D., Angus J. |
Acoustics and Psychoacoustics, Third Edition (Music Technology) |
2006 • | •• |
182127 |
|
Howard D., Angus J. |
Acoustics and Psychoacoustics, Second Edition (Music Technology) |
2001 • | •• |
57913 |
|
Howard Eisner |
Reengineering Yourself and Your Company: From Engineer to Manager to Leader |
2000 | •• |
184087 |
|
Howard G. |
Lie algebras in particle physics |
1982 | •• |
151207 |
|
Howard G., Brown W. |
Modern Protein Chemistry: Practical Aspects |
2002 | •• |
132327 |
|
Howard G. Hanson |
Voronoi Cell Properties from Simulated and Real Random Spheres and Points |
1982 | •• |
79586 |
|
Howard J. |
Idioms in American Life |
1987 • | •• |
215135 |
|
Howard J., Resnick Ph.D. |
Os Valores da Liberdade |
n/a | •• |
20881 |
|
Howard J., Whitcombe D.M. |
Diagnostic Bacteriology Protocols |
1995 | •• |
23872 |
|
Howard M., Levy M., Waymire R. |
Designing Secure Web-Based Applications for Microsoft Windows 2000 with CDROM |
2000 | •• |
22423 |
|
Howard M., LeBlanc D. |
Writing Secure Code |
2001 | •• |
23475 |
|
Howard M., LeBlanc D. |
Writing Secure Code |
2002 • | •• |
27799 |
|
Howard M., LeBlanc D., Viega J. |
19 Deadly Sins of Software Security: Programming Flaws and How to Fix Them |
2005 | •• |
28115 |
|
Howard M., Lipner S. |
The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More Secure Software |
2006 | •• |
26484 |
|
Howard M., LeBlanc D. |
Writing Secure Code for Windows Vista |
2007 | •• |
11099 |
|
Howard M. |
The first world war |
2002 | •• |
134818 |
|
Howard M., LeBlanc D., Viega J. |
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them |
2009 | •• |
168285 |
|
Howard M., LeBlanc D., Viega J. |
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them |
2010 | •• |
153920 |
|
Howard Mancel Roberts |
Super Chops: Jazz Guitar Technique in 20 Weeks |
1978 | •• |
199807 |
|
Howard Mann |
Your business brickyard |
2007 | •• |
58446 |
|
Howard Mark, Jerry Workman Jr. |
Statistics in Spectroscopy |
2003 • | •• |
44793 |
|
Howard N.E. |
Standard Handbook for Telescope Making |
1959 | •• |
74103 |
|
Howard O. |
Vector Bundles. Volume 1: Foundations and Stiefel-Whitney |
1983 | •• |
111381 |
|
Howard P. |
Solving Ordinary Differential Equations with Matlab |
2007 | •• |
23809 |
|
Howard P.D. |
Building and Implementing a Security Certification and Accreditation Program |
2006 | •• |
105646 |
|
Howard P.G., Kossentini F., Martins B. |
The emerging JBIG2 standard |
n/a | •• |
161179 |
|
Howard P.N. |
The Digital Origins of Dictatorship and Democracy: Information Technology and Political Islam (Oxford Studies in Digital Politics) |
2010 | •• |
180137 |
|
Howard R. |
Cyber Fraud: Tactics, Techniques and Procedures |
2009 | •• |
152652 |
|
Howard R., Gow N. |
Biology of the Fungal Cell (The Mycota VIII) |
2007 • | •• |
55303 |
|
Howard R. |
Iran Oil: The New Middle East Challenge to America |
2007 | •• |
11195 |
|
Howard R.E. |
Riot at Bucksnort and Other Western Tales |
2005 | •• |
126310 |
|
Howard R.J., Gow N.A.R. |
The Mycota VIII - Biology of the Fungal Cell |
2007 • | •• |
198067 |
|
Howard R.M. |
Principles of random signal analysis and low noise design |
2002 | •• |
187036 |
|
Howard S. |
Principles and Techniques of Spine Surgery |
1998 | •• |
76731 |
|
Howard S. Rasheed |
Developing Entrepreneurial Potential in Youth: The Effects of Entrepreneurial Education and Venture Creation |
n/a | •• |
134537 |
|
Howard Silverstone, Howard R. Davia |
Fraud 101: Techniques and Strategies for Detection |
2005 • | •• |
213914 |
|
Howard T. C., Pederson W. D. |
Franklin D. Roosevelt and the Formation of the Modern World |
2015 | •• |
139750 |
|
Howard-Grenville J. |
Corporate Culture and Environmental Practice: Making Change at a High-Technology Manufacturer |
2007 | •• |
29073 |
|
Howcroft D. (ed.), Trauth E.M. (ed.) |
Handbook of Critical Information Systems Research: Theory and Application |
2005 | •• |
114479 |
|
Howcroft Debra, Richardson Helen |
Work and Life in the Global Economy: A Gendered Analysis of Service Work |
2010 | •• |
167411 |
|
Howe C. |
Conceptual Structure in Childhood and Adolescence: The Case of Everyday Physics (International Library of Psychology) |
1998 • | •• |
170806 |
|
Howe M. |
Theory of Vortex Sound (Cambridge Texts in Applied Mathematics) |
2003 | •• |
158674 |
|
Howe M. |
Theory of vortex sound |
2003 | •• |
185551 |
|
Howe M. |
Theory of vortex sound |
2003 | •• |
151492 |
|
Howe M., Goodman G., Cicchetti D. |
Stress, Trauma, and Children's Memory Development: Neurobiological, Cognitive, Clinical, and Legal Perspectives |
2008 | •• |
168998 |
|
Howe P. |
Transforming Growth Factor-Beta Protocols |
2008 | •• |