Thomas Adewumi University
  • Advanced Search
  • Upload
  • Guest
  • Login
  • Register
  • Browse
  • Books
  • Shelves
  • Accounting (Public)
  • Anatomy (Public)
  • Artificial Intelligence (Public)
  • Biochemistry (Public)
  • Business Administration (Public)
  • Civil Engineering (Public)
  • Communication Engineering (Public)
  • Community Health Science (Public)
  • Computer Engineering (Public)
  • Computer Science (Public)
  • Criminology and Security Studies (Public)
  • Cyber Security (Public)
  • Data Science (Public)
  • Economics (Public)
  • Electrical Electronic (Public)
  • English and Literary Studies (Public)
  • Entrepreneurship (Public)
  • Environmental Health (Public)
  • Finance (Public)
  • Human Nutrition and Dietetics (Public)
  • Information Technology (Public)
  • Intelligence and Security Studies (Public)
  • Law (Public)
  • Marine Science (Public)
  • Mass Communication (Public)
  • Mechanical Engineering (Public)
  • Medical Laboratory Science (Public)
  • Medicinal Chemistry (Public)
  • Medicine and Surgery (Public)
  • Microbiology (Public)
  • Nursing Science (Public)
  • Petroleum Chemistry (Public)
  • Physics with Electronics (Public)
  • Physiology (Public)
  • Physiotherapy (Public)
  • Public Health (Public)
  • Radiography (Public)
  • Software Engineering (Public)

Discover (Random Books)

An Introduction To Labour And Industrial Laws

An Introduction To Labour And Industrial Laws

S.k.Puri

Principles of Data Transfer Through Communications Networks, the Internet, and Autonomous Mobiles

Principles of Data Transfer Through Communications Networks, ...

Izhak Rubin

Copyright and Cartography

Copyright and Cartography

Isabella Alexander (author)

Tiny Machine Learning Techniques for Constrained Devices

Tiny Machine Learning Techniques for Constrained Devices

Khalid El-Makkaoui & Ismail Lamaakal & Ibrahim Ouahbi & Yassine Maleh & Ahmed A. Abd El-Latif

Category: Intelligent Computing

Recent Advances in Computational Intelligence and Cyber Security

Recent Advances in Computational Intelligence and Cyber Security

Ashok Kumar Singh & Zeeshan Ali Siddiqui & Siddharth Singh & Amit Kumar Singh & Tanveer J. Siddiqui

Book Details

...