Skip to content
Scan a barcode
Scan
Added to your cart

Max Van Leeuwen

Follow to get improved recommendations.

You Might Also Enjoy

The Fuzzy Systems Handbook: A Practitioner's Guide to Building, Using, & Maintaining Fuzzy Systems
The Fuzzy Systems Handbook: A Practitioner's Guide to Building, Using, & Maintaining Fuzzy Systems
Earl Cox

from: $7.09

Smart Home Automation with Linux
Smart Home Automation with Linux
Steven Goodwin

from: $5.89

Document Engineering: Analyzing and Designing Documents for Business Informatics and Web Services
Document Engineering: Analyzing and Designing Documents for Business Informatics and Web Services
Tim McGrath, Robert J. Glushko

from: $8.39

Zero Configuration Networking: The Definitive Guide
Zero Configuration Networking: The Definitive Guide
Daniel H. Steinberg, Stuart Cheshire

from: $11.59

IPv6: The New Internet Protocol (2nd Edition)
IPv6: The New Internet Protocol (2nd Edition)
Christian Huitema

from: $12.19

Penetration Testing: Security Analysis (EC-Council Certified Security Analyst (ECSA))
Penetration Testing: Security Analysis (EC-Council Certified Security Analyst (ECSA))
EC-Council

from: $7.39

Computer Forensics: Investigating Data and Image Files
Computer Forensics: Investigating Data and Image Files
EC-Council

from: $8.29

Fuzzy Expert Systems and Fuzzy Reasoning
Fuzzy Expert Systems and Fuzzy Reasoning
James J. Buckley, William Siler

from: $63.59

Knowledge Management in Fuzzy Databases
Knowledge Management in Fuzzy Databases
Maria A. Vila

from: $169.99

Formal Methods of Programme Verification and Specification (Prentice-Hall Software Series)
Formal Methods of Programme Verification and Specification (Prentice-Hall Software Series)
Franta

from: $11.49

Foundations of Neural Networks, Fuzzy Systems, and Knowledge Engineering (Computational Intelligence)
Foundations of Neural Networks, Fuzzy Systems, and Knowledge Engineering (Computational Intelligence)
Nikola K. Kasabov

from: $11.99

New Programmer's Survival Manual
New Programmer's Survival Manual
Joshua Carter

from: $6.49

Puppet Types and Providers: Extending Puppet with Ruby
Puppet Types and Providers: Extending Puppet with Ruby
Nan Liu, Dan Bode

from: $19.99

Penetration Testing: Network Threat Testing (Penetration Testing: Ec-Council Certified Security Analyst)
Penetration Testing: Network Threat Testing (Penetration Testing: Ec-Council Certified Security Analyst)
EC-Council

from: $23.49

Ansible Configuration Management
Ansible Configuration Management
Daniel Hall

from: $30.29

Introduction to Computer Science at UCF
Introduction to Computer Science at UCF
Gary B. Shelly

Out of Stock

Nonlinear Time Series Analysis: Methods and Applications (Nonlinear Time Series and Chaos)
Nonlinear Time Series Analysis: Methods and Applications (Nonlinear Time Series and Chaos)
Cees Diks

Out of Stock

Design and Analysis of Coalesced Hashing (International Monographs on Computer Science)
Design and Analysis of Coalesced Hashing (International Monographs on Computer Science)
Jeffrey Scott Vitter, Wen-Chin Chen

Out of Stock

Classification Algorithms
Classification Algorithms
M. James, M. James

Out of Stock

Fuzzy Sets and Fuzzy Decisionmaking
Fuzzy Sets and Fuzzy Decisionmaking
Hong-Xing Li

Out of Stock

Copyright © 2025 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks ® and the ThriftBooks ® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured