Case study of a Soviet Republic The Estonian SSR.
By: Contributor(s): Material type:
TextLanguage: Japanese Publication details: Colorado Westview Press 1978Description: xxiii,432p. cmDDC classification: - V58'N6, L8
Textual
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Textual
|
South Campus Library | South Campus Library | V58'N6 L8 (Browse shelf(Opens below)) | Available | SC0673130 |
There are no comments on this title.
Log in to your account to post a comment.
-
1
5G NR, Wi-Fi 6, and bluetooth LE 5: A prime on smartphone wireless technologies
by Morais, Douglas H -
2
Accessing information through internet
by Nair R Raman -
3
Adaptive technology for the internet: making electronic resources accessible to all
by Mates Barbara T -
4
Advanced artificial intelligence
by Shi Zhongzhi -
5
Advanced Wireless Communications and Internet
by Glisic, Savo G. -
6
Al morality
-
7
Architecture of network systems
by Serpanos Dimitrios; Wolf Tilman -
8
Big book of IPsec RFCs
by Loshin Pete Comp -
9
Biz talk: implementing business to business e-commerce
by Kobielus James G -
10
Building the internet of things with IPv6 and MIPv6
by Minoli Daniel -
11
Business process orientation: gaining the e-business competitive advantage
by McCormack Kevin P -
12
Business web strategy:design, alignment and application
by Al- Hakim Latif -
13
Cases on global e-learning practices:successis and pitfalls
by Sharma Ramesh C -
14
Chinese Cyber Nationalism
by Wu Xu -
15
Cloud and fog computing in 5G mobile networks: Emerging advances and applications
by Markakis Evangelos Ed. -
16
Complete handbook of the internet
by Buchanan W J -
17
Complete handbook of the internet
by Buchanan W J -
18
Complex networks
by Erciyes Kayhan -
19
Computer security literacy staying safe in a digital world
by Jacobson Douglas; Idziorek Joseph -
20
Computers, Internet and New Technology Laws
by Seth Karnika -
21
Cryptography and network security: Principles and practice
by Stallings William -
22
Cryptography and network security: Principles and practice
by Stallings William -
23
Cryptography and network security: Principles and practice
by Stallings William -
24
Cryptography and network security: Principles and practice
by Stallings William -
25
Cryptography and network security: Principles and practice
by Stallings William -
26
Cryptography and network security: Principles and practice
by Stallings William -
27
Cryptography and network security: Principles and practice
by Stallings William -
28
Cryptography and network security: Principles and practice
by Stallings William -
29
Cryptography and network security: Principles and practice
by Stallings William -
30
Cryptography and network security: Principles and practice
by Stallings William -
31
Cryptography and network security: Principles and practice
by Stallings William -
32
Cryptography and network security: Principles and practice
by Stallings William -
33
Cryptography and network security: Principles and practice
by Stallings William -
34
Cryptography and network security: Principles and practice
by Stallings William -
35
Cryptography and network security: Principles and practice
by Stallings William -
36
Cryptography and network security: Principles and practice
by Stallings William -
37
Cryptography and network security: Principles and practice
by Stallings William -
38
Cryptography and network security: Principles and practice
by Stallings William -
39
Cryptography and network security: Principles and practice
by Stallings William -
40
Cryptography and network security: Principles and practice
by Stallings William -
41
Cryptography and network security: Principles and practice
by Stallings William -
42
Cryptography and network security: Principles and practice
by Stallings William -
43
Cryptography and network security: Principles and practice
by Stallings William -
44
Cryptography and network security: Principles and practice
by Stallings William -
45
Cryptography and network security: Principles and practice
by Stallings William -
46
Cryptography and network security: Principles and practice
by Stallings William -
47
Cryptography and network security: Principles and practice
by Stallings William -
48
Cyber China
by Mengin Francoise Ed. -
49
Cyber crimes: a primer on internet threats and email abuses
by Kumar G Ram -
50
Cyber crimes: a primer on internet threats and email abuses
by Kumar G Ram
Case study of a Soviet Republic
APA
Parming Tonu Ed, Jarvesoo Elmar Ed, . (1978). Case study of a Soviet Republic. Colorado: Westview Press.
Chicago
Parming Tonu Ed, Jarvesoo Elmar Ed, . 1978. Case study of a Soviet Republic. Colorado: Westview Press.
Harvard
Parming Tonu Ed, Jarvesoo Elmar Ed, . (1978). Case study of a Soviet Republic. Colorado: Westview Press.
MLA
Parming Tonu Ed, Jarvesoo Elmar Ed, . Case study of a Soviet Republic. Colorado: Westview Press. 1978.
