Thomas Adewumi University
  • Advanced Search
  • Upload
  • Guest
  • Login
  • Register
  • Browse
  • Books
  • Shelves
  • Accounting (Public)
  • Anatomy (Public)
  • Artificial Intelligence (Public)
  • Biochemistry (Public)
  • Business Administration (Public)
  • Civil Engineering (Public)
  • Communication Engineering (Public)
  • Community Health Science (Public)
  • Computer Engineering (Public)
  • Computer Science (Public)
  • Criminology and Security Studies (Public)
  • Cyber Security (Public)
  • Data Science (Public)
  • Economics (Public)
  • Electrical Electronic (Public)
  • English and Literary Studies (Public)
  • Entrepreneurship (Public)
  • Environmental Health (Public)
  • Finance (Public)
  • Human Nutrition and Dietetics (Public)
  • Information Technology (Public)
  • Intelligence and Security Studies (Public)
  • Law (Public)
  • Marine Science (Public)
  • Mass Communication (Public)
  • Mechanical Engineering (Public)
  • Medical Laboratory Science (Public)
  • Medicinal Chemistry (Public)
  • Medicine and Surgery (Public)
  • Microbiology (Public)
  • Nursing Science (Public)
  • Petroleum Chemistry (Public)
  • Physics with Electronics (Public)
  • Physiology (Public)
  • Physiotherapy (Public)
  • Public Health (Public)
  • Radiography (Public)
  • Software Engineering (Public)

Discover (Random Books)

Data Science in Context

Data Science in Context

Peter Norvig & Alfred Z. Spector & Chris Wiggins & Jeannette M. Wing

Indigenous Peoples as Subjects of International Law

Indigenous Peoples as Subjects of International Law

Irene Watson

Social Media and Law Enforcement Practice in Poland

Social Media and Law Enforcement Practice in Poland

Paweł Waszkiewicz

Boundary Methods

Boundary Methods

Subrata Mukherjee & Yu Xie Mukherjee

Category: 2 Placing the terrorism–counterterrorism nexus in context

Terrorism, Democracy, and Human Security

Terrorism, Democracy, and Human Security

Ronald Crelinsten

Book Details

...