Urodynamic changes in patients after unilateral open inguinal hernia repair
By: Contributor(s): Material type:
TextLanguage: English Publication details: 2012Subject(s):
Dissertations
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Thesis
|
Central Library | Central Library | Not for loan | TH0019212 |
There are no comments on this title.
-
1
5G NR, Wi-Fi 6, and bluetooth LE 5: A prime on smartphone wireless technologies
by Morais, Douglas H -
2
Accessing information through internet
by Nair R Raman -
3
Adaptive technology for the internet: making electronic resources accessible to all
by Mates Barbara T -
4
Advanced artificial intelligence
by Shi Zhongzhi -
5
Advanced Wireless Communications and Internet
by Glisic, Savo G. -
6
Al morality
-
7
Architecture of network systems
by Serpanos Dimitrios; Wolf Tilman -
8
Big book of IPsec RFCs
by Loshin Pete Comp -
9
Biz talk: implementing business to business e-commerce
by Kobielus James G -
10
Building the internet of things with IPv6 and MIPv6
by Minoli Daniel -
11
Business process orientation: gaining the e-business competitive advantage
by McCormack Kevin P -
12
Business web strategy:design, alignment and application
by Al- Hakim Latif -
13
Cases on global e-learning practices:successis and pitfalls
by Sharma Ramesh C -
14
Chinese Cyber Nationalism
by Wu Xu -
15
Cloud and fog computing in 5G mobile networks: Emerging advances and applications
by Markakis Evangelos Ed. -
16
Complete handbook of the internet
by Buchanan W J -
17
Complete handbook of the internet
by Buchanan W J -
18
Complex networks
by Erciyes Kayhan -
19
Computer security literacy staying safe in a digital world
by Jacobson Douglas; Idziorek Joseph -
20
Computers, Internet and New Technology Laws
by Seth Karnika -
21
Cryptography and network security: Principles and practice
by Stallings William -
22
Cryptography and network security: Principles and practice
by Stallings William -
23
Cryptography and network security: Principles and practice
by Stallings William -
24
Cryptography and network security: Principles and practice
by Stallings William -
25
Cryptography and network security: Principles and practice
by Stallings William -
26
Cryptography and network security: Principles and practice
by Stallings William -
27
Cryptography and network security: Principles and practice
by Stallings William -
28
Cryptography and network security: Principles and practice
by Stallings William -
29
Cryptography and network security: Principles and practice
by Stallings William -
30
Cryptography and network security: Principles and practice
by Stallings William -
31
Cryptography and network security: Principles and practice
by Stallings William -
32
Cryptography and network security: Principles and practice
by Stallings William -
33
Cryptography and network security: Principles and practice
by Stallings William -
34
Cryptography and network security: Principles and practice
by Stallings William -
35
Cryptography and network security: Principles and practice
by Stallings William -
36
Cryptography and network security: Principles and practice
by Stallings William -
37
Cryptography and network security: Principles and practice
by Stallings William -
38
Cryptography and network security: Principles and practice
by Stallings William -
39
Cryptography and network security: Principles and practice
by Stallings William -
40
Cryptography and network security: Principles and practice
by Stallings William -
41
Cryptography and network security: Principles and practice
by Stallings William -
42
Cryptography and network security: Principles and practice
by Stallings William -
43
Cryptography and network security: Principles and practice
by Stallings William -
44
Cryptography and network security: Principles and practice
by Stallings William -
45
Cryptography and network security: Principles and practice
by Stallings William -
46
Cryptography and network security: Principles and practice
by Stallings William -
47
Cryptography and network security: Principles and practice
by Stallings William -
48
Cyber China
by Mengin Francoise Ed. -
49
Cyber crimes: a primer on internet threats and email abuses
by Kumar G Ram -
50
Cyber crimes: a primer on internet threats and email abuses
by Kumar G Ram
Urodynamic changes in patients after unilateral open inguinal hernia repair
APA
Veerwal Abhinav, University of Delhi. Faculty of Medical Sciences. Department of General Surgery, Dr. Shaji Thomas Gu & University of Delhi. Faculty of Medical Sciences. Department of General Surgery. (2012). Urodynamic changes in patients after unilateral open inguinal hernia repair. : .
Chicago
Veerwal Abhinav, University of Delhi. Faculty of Medical Sciences. Department of General Surgery, Dr. Shaji Thomas Gu and University of Delhi. Faculty of Medical Sciences. Department of General Surgery. 2012. Urodynamic changes in patients after unilateral open inguinal hernia repair. : .
Harvard
Veerwal Abhinav, University of Delhi. Faculty of Medical Sciences. Department of General Surgery, Dr. Shaji Thomas Gu and University of Delhi. Faculty of Medical Sciences. Department of General Surgery. (2012). Urodynamic changes in patients after unilateral open inguinal hernia repair. : .
MLA
Veerwal Abhinav, University of Delhi. Faculty of Medical Sciences. Department of General Surgery, Dr. Shaji Thomas Gu and University of Delhi. Faculty of Medical Sciences. Department of General Surgery. Urodynamic changes in patients after unilateral open inguinal hernia repair. : . 2012.
