La mujer invisible: Descubre cómo los datos configuran un mundo hecho por y para los hombres Caroline Criado Perez4.7
A Joosr Guide to… The Rise of the Robots by Martin Ford: Technology and the Threat of Mass Unemployment Joosr2.5
A Joosr Guide to... The Innovators by Walter Isaacson: How a Group of Hackers, Geniuses and Geeks Created the Digital Revolution Joosr
Critical Infrastructure Risk Assessment: The Definitive Threat Identification and Threat Reduction Handbook Ernie Hayden
Superpotencias de la inteligencia artificial: China, Silicon Valley y el nuevo orden mundial Kai-Fu Lee4.6
VANISHED BUT STILL THERE: WHERE HUMAN INDIVIDUALITIES ARE PERHAPS RECORDED IN A NON-PHYSICAL ENVIRONMENT
Caracterización de la gerencia de proyectos de construcción en la ciudad de Tunja María Nuncia Medina Suárez
Menos violencia, más paz: Identificar el acoso escolar: elementos para la acción Martha Cecilia Álvarez Hincapié
An End to Upside Down Living: Reorienting Our Consciousness to Live Better and Save the Human Species Mark Gober4
The Voice Catchers : How Marketers Listen In to Exploit Your Feelings, Your Privacy and Your Wallet: How Marketers Listen In to Exploit Your Feelings, Your Privacy, and Your Wallet Joseph Turow
The Working Horse - A Guide on Equestrian Knowledge with Information on Shire and Carriage Horses J. Prince-Sheldon
Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN5