Data Mashup with Microsoft Excel Using Power Query and M: Finding, Transforming, and Loading Data from External Sources
View more
Data Mashup with Microsoft Excel Using Power Query and M: Finding, Transforming, and Loading Data from External Sources
张春桥狱中家书.Zhang Chunqiao yu zhong jia shu.
View more
张春桥狱中家书.Zhang Chunqiao yu zhong jia shu.
Flex 4 Cookbook - Joshua Noble, Todd Anderson, Garth Braithwaite, Marco Casario, and Rich Tretola
View more
Flex 4 Cookbook - Joshua Noble, Todd Anderson, Garth Braithwaite, Marco Casario, and Rich Tretola
Hadoop Operations and Cluster Management Cookbook - Shumin Guo
View more
Hadoop Operations and Cluster Management Cookbook - Shumin Guo
AdvancED Flex 3 - Shashank Tiwari, Jack Herrington, Elad Elrom and Joshua Mostafa
View more
AdvancED Flex 3 - Shashank Tiwari, Jack Herrington, Elad Elrom and Joshua Mostafa
Machine Learning with TensorFlow MEAP - Nishant Shukla
View more
Machine Learning with TensorFlow MEAP - Nishant Shukla
Malware Data Science - Joshua Saxe with Hillary Sanders
View more
Malware Data Science - Joshua Saxe with Hillary Sanders
術数学の思考 : 交叉する科学と占術 = Scientific ideas in the field called the study of shushu -Jutsusūgaku no shikō : kōsasuru kagaku to senjutsu = Scientific ideas in the field called the study of shushu
View more
術数学の思考 : 交叉する科学と占術 = Scientific ideas in the field called the study of shushu -Jutsusūgaku no shikō : kōsasuru kagaku to senjutsu = Scientific ideas in the field called the study of shushu
Design Patterns by Tutorials 2nd Edition - Joshua Greene and Jay Strawn
View more
Design Patterns by Tutorials 2nd Edition - Joshua Greene and Jay Strawn
Language Proficiency Testing for Chinese as a Foreign Language: An Argument-Based Approach for Validating the Hanyu Shuiping Kaoshi (HSK)
View more
Language Proficiency Testing for Chinese as a Foreign Language: An Argument-Based Approach for Validating the Hanyu Shuiping Kaoshi (HSK)
Hacking Exposed Wireless Wireless Security Secrets and Solutions, 3rd Edition - Joshua Wright and Johnny Cache
View more
Hacking Exposed Wireless Wireless Security Secrets and Solutions, 3rd Edition - Joshua Wright and Johnny Cache
Data Mashups in R - Jeremy Leipzig and Xiao-Yi Li
View more
Data Mashups in R - Jeremy Leipzig and Xiao-Yi Li
GPT-3 - Sandra Kublik and Shubham Saboo
View more
GPT-3 - Sandra Kublik and Shubham Saboo
OpenShift for Developers 2nd Edition - Joshua Wood and Brian Tannous
View more
OpenShift for Developers 2nd Edition - Joshua Wood and Brian Tannous
软件测试的艺术(原书第2版) Ruan jian ce shi de yi shu (The Art of Software Testing)
View more
软件测试的艺术(原书第2版) Ruan jian ce shi de yi shu (The Art of Software Testing)
Effective Java 2nd Edition - Joshua Bloch
View more
Effective Java 2nd Edition - Joshua Bloch
Spring in Practice - Willie Wheeler with Joshua White
View more
Spring in Practice - Willie Wheeler with Joshua White
作家之路 : 從英雄的旅程學習說一個好故事 -Zuo jia zhi lu : cong ying xiong de lu cheng xue xi shuo yi ge hao gu shi
View more
作家之路 : 從英雄的旅程學習說一個好故事 -Zuo jia zhi lu : cong ying xiong de lu cheng xue xi shuo yi ge hao gu shi