Literacy Gudchinsky Sarah C growing infulence of linguistics
By: Material type:
TextLanguage: English Series: Trrends in linguistics state of the Art Report ed by W Winter; 2Publication details: The hague Mouton 1976Subject(s): DDC classification: - T31:3(P), L6
| Item type | Current library | Home library | Call number | Status | Barcode | |
|---|---|---|---|---|---|---|
Textual
|
Arts Library | Arts Library | T31:3(P) L6 (Browse shelf(Opens below)) | Available | AL0593473 |
There are no comments on this title.
Log in to your account to post a comment.
-
1
Lithium niobate photonics
by Toney James E. -
2
Wireless positionning
by Bensky Alan -
3
Information hiding
by Katzenbeisser Stefan -
4
From LTE to LTE-advanced pro and 5G
by Rahnema Moe -
5
From LTE to LTE-Advanced pro and 5G
by Rahnema Moe -
6
Understanding GPS/GNSS: Principles and applications
by Kaplan Elliott D Ed. -
7
Activity-based intelligence: principles and applications
by Biltgen Patrick -
8
5G spectrum and standards
by Varrall Geoff -
9
5G and satellite spectrum, standards, and scale
by Varrall Geoff -
10
Contemporary cryptography
by Oppliger Rolf -
11
Understanding smart sensors
by Frank Randy -
12
Introduction to 4G mobile communications
by Korhonen Juha -
13
Secure messaging on he internet
by Oppliger Rolf -
14
Information hiding techniques for steganography and digital watermarking
by Katzenbeiser Stefan Ed.; Petitcolas Fabien A P Ed. -
15
Information hiding techniques for steganography and digital watermarking
by Katzenbeiser Stefan Ed.; Petitcolas Fabien A P Ed. -
16
Internet technologies for fixed and mobile networks
by Jahevski Toni -
17
Introduction to communication networks
by Anttalainen Tarmo; Jaaskelainen Ville -
18
Fundamentals and Applications of Nanomaterials
by Guo, Zhen -
19
Cryptography for security and privacy in cloud computing
by Rass Stefan; Slamanig Daniel -
20
Information hiding techniques for steganography and digital
by Katzenbeisser Stefan; Petittcolas Fabien A.P -
21
Battery modeling : battery management systems
by Plett Gregory L -
22
Security for cloud computing
by Lombardi Flavio; Pietro Roberto Di -
23
Microwave diode control devices
by Garver Robert V -
24
Inorganic nanoprobes for biological sensing and imaging
by Mattoussi Hedi Ed. -
25
Semiconductor nanostructures for optoelectronic applications
by Steiner Todd Ed. -
26
Practical guide to error control coding using matlab
by Jiang Yuan -
27
Electronic information processing
by Smith W V -
28
Wireless sensor networks for healthcare applications
by Dishongh Terrance J -
29
Advanced materials and techniques for radiation dosimetry
by Arshak Khalil Ed. -
30
Nanoelectronics:principles and devices
by Dragoman Mircea -
31
Nanoelectronics:principles and devices
by Dragoman Mircea -
32
Ubiquitous positioning
by Mannings Robin -
33
Securing information and communications systems:principles,technologies and applications
by Furnell Steven M Ed. -
34
Implementing the ISO/IEC 27001 information security management system standard
by Humphreys Edward -
35
Role-based access control
by Ferraiolo David F -
36
Component reliability for electronic systems
by Bajenescu Titu-Marius I -
37
Practical process simulation using object-oriented techniques and C++
by Garrido Jose M -
38
Users's guide to cryptography and standards
by Dent Alexander W -
39
Role engineering for enterprise security management
by Coyne Edwrad J -
40
Role engineering for enterprise security management
by Coyne Edward J -
41
Fundamentals and applications of nanomaterials
by Guo Zhen -
42
Utility computing technologies, standards and strategies
by Mendoza Alfredo -
43
Micro and nanoengineering of the cell and microenvironment:technologies and applications
by Khademhosseini Ali Ed. -
44
SSL and TLS:theory and practice
by Oppliger Rolf -
45
Fuzzing for software security testing and quality assurance
by Takanen Ari -
46
Broadband wireless access and local networks: Mobile wimax and wifi
by Lee Byeong Gi -
47
Contemporary cryptography
by Oppliger Rolf -
48
Outsourcing information security
by Axelrod C Warren -
49
Outsourcing information security
by Axelrod C Warren -
50
Guide to advanced software testing
by Hass Anne Mette Jonassen
Literacy
APA
Gudchinsky Sarah C, . (1976). Literacy. The: hague Mouton.
Chicago
Gudchinsky Sarah C, . 1976. Literacy. The: hague Mouton.
Harvard
Gudchinsky Sarah C, . (1976). Literacy. The: hague Mouton.
MLA
Gudchinsky Sarah C, . Literacy. The: hague Mouton. 1976.
