|
Treasure of the Gold Dragon (Dragon Masters #12)
by
|
|
|
Diario delle storie sbagliate
by
|
|
|
Poison Ivy's Big Boss in Bloom
by
|
|
|
High-Tech Highways and Super Skyways: The Next 100 Years of Transportation (Our World: The Next 100 Years)
by
|
|
|
Diario delle storie d'amore sbagliate
by
3.60 avg rating — 5 ratings
|
|
|
The President Wears Pink
by
|
|
|
Batman's Most Wanted
by
really liked it 4.00 avg rating — 4 ratings
—
5 editions
|
|
|
Maîtres des dragons, Tome 12: Le trésor du dragon d'Or
by
really liked it 4.00 avg rating — 4 ratings
—
2 editions
|
|
|
Power Plays: The Next 100 Years of Energy (Our World: The Next 100 Years)
by
|
|
|
The Riddler and the Jinx
by
|
|
|
The Joker Hideout Heist
by
|
|
|
Computer Security -- ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedings (Lecture Notes in Computer Science, 7459)
by
really liked it 4.00 avg rating — 1 rating
—
published
2012
—
2 editions
|
|
|
Security and Privacy in Communication Networks: 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, ... Telecommunications Engineering Book 335)
by
|
|
|
Eserciziario di basi dati
by
0.00 avg rating — 0 ratings
|
|
|
Computer Security -- ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedings (Lecture Notes in Computer Science Book 7459)
by
0.00 avg rating — 0 ratings
|
|
|
Preserving Privacy in Data Outsourcing (Advances in Information Security Book 99)
by
0.00 avg rating — 0 ratings
|
|
|
Information Security Theory and Practice: 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings ... Notes in Computer Science Book 9895)
by
0.00 avg rating — 0 ratings
|
|
|
Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings (Lecture Notes in Computer Science, 6166)
by
0.00 avg rating — 0 ratings
—
published
2010
|
|
|
[(Computer Security : ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12 2012 : Proceedings )] [Author: Sara Foresti] [Aug-2012]
by
0.00 avg rating — 0 ratings
|
|
|
HISTORIAS DE HADAS
by
0.00 avg rating — 0 ratings
|
|
|
Information Security Theory and Practice: 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings ... Notes in Computer Science Book 9895)
by
0.00 avg rating — 0 ratings
|
|
|
Cryptology and Network Security: 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings
by
|
|
|
Information Security Theory and Practice: 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings
by
|
|
|
Security and Trust Management: 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings
by
0.00 avg rating — 0 ratings
—
published
2015
—
4 editions
|
|
|
Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings
by
0.00 avg rating — 0 ratings
—
published
2011
|
|
|
Preserving Privacy in Data Outsourcing (Advances in Information Security, 51)
by
0.00 avg rating — 0 ratings
—
published
2010
—
3 editions
|
|
|
Security and Privacy in Communication Networks: 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, ... Telecommunications Engineering Book 336)
by
|
|
|
Contes de fées
by
0.00 avg rating — 0 ratings
—
published
2019
|
|
|
Power Plays: The Next 100 Years of Energy
by
0.00 avg rating — 0 ratings
|
|
|
High-Tech Highways and Super Skyways: The Next 100 Years of Transportation
by
0.00 avg rating — 0 ratings
|
|
* Note: these are all the books on Goodreads for this author. To add more books,
click here.