The Use of Routine Health Data in Low- and Middle-Income Countries
Jim Todd & Michael Johnson Mahande
An Engineering Approach to Computer Networking
Srinivasan Keshav
AI at the Edge
Daniel Situnayake & Jenny Plunkett
Research Methods in Critical Security Studies
Mark B. Salter & Can E. Mutlu
Public International Law
Sué González Hauck & Raffaela Kunz & Max Milas