Quantum mechanics is an extraordinarily successful scientific theory. It is also completely mad. Although the theory quite obviously works, it …
This book shows some contributions presented in the 2010 International Conference on Robotic Welding, Intelligence and Automation (RWIA’2010), Oct. 14-16, …
An authoritative guide to investigating high-technology crimesInternet crime is seemingly ever on the rise, making the need for a comprehensive …
True pdf. Final release. ISBN-13: 978-1718501041. August 11th 2020. ------------------------- A detailed introduction to the C programming language for experienced …
With Stoelting’s Anesthesia and Co-Existing Disease, you’ll have the succinct, yet thorough guidance you need to successfully avoid or manage …
Manning, 2015. — 330 p. — ISBN: 9781617290343Big Data teaches you to build big data systems using an architecture that …
"A groundbreaking biography that places an obsessive, unrequited love at the heart of the writer's life story, transforming her from …
Scalability Rules is the easy-to-use scalability primer and reference for every architect, developer, web professional, and manager. Authors Martin L. …
Version Control with Git takes you step-by-step through ways to track, merge, and manage software projects, using this highly flexible, …
Children who have autism require comprehensive educational and treatment services. There are a myriad of approaches currently recommended to practitioners …
InUser Friendly, Cliff Kuang and Robert Fabricant reveal the untold story of a paradigm that quietly rules our modern lives: …
Following the success of Linux Basics for Hackers, OccupytheWeb does what he did for Linux to Networks. Networks of all …
Small business owners and solo professionals know they're supposed to use social media to increase sales, but how should they …
This book offers a brief review of and investigations into the power quality problem in the new technology of co-phase …
The publications of the Hakluyt Society (founded in 1846) made available edited (and sometimes translated) early accounts of exploration. The …
A burned car sits on a Tennessee hilltop, a woman's lifeless, charred body seated inside. Forensic anthropologist Bill Brockton's job …
This book constitutes the refereed proceedings of the 20th Brazilian Symposium on Formal Methods, SBMF 2017, which took place in …
Why do nations break into one anothers most important computer networks? There is an obvious answer: to steal valuable information …
Get up and running with machine learning life cycle management and implement MLOps in your organizationKey FeaturesBecome well-versed with MLOps …
Only once in a great while does a writer come along who defies comparison--a writer so original he redefines the …
This is the first single-volume introduction to the national history of crime and punishment. From the medieval period to the …
More than a quarter of a million copies sold in previous editions! Freedom is a feature With Fedora's new Online …
he authors of javascript books are probably some of the brightest people around. And maybe thats the problem. Maybe they …
Debunking many of today’s myths about the future prospects and growth of information technology, this book uses a variety of …
In Lost Modernities Alexander Woodside offers a probing revisionist overview of the bureaucratic politics of preindustrial China, Vietnam, and Korea. …
This classic bestseller is THE career-design bible for college graduates and midlife career-changers alike. Now fully revised and updated for …
The souls of those long dead are entering the universe at an alarming rate. Stealing the bodies of the living, …
One of the enduring concerns of moral philosophy is deciding who or what is deserving of ethical consideration. Much recent …
Guerrilla Marketing Excellence explains fifty rules aimed at fine-tuning your marketing style. It includes information on the uses of video, …
Tor's edition of this classic horror story will accompany the Francis Ford Coppola film Mary Shelley's Frankenstein--a major motion picture …