Professional critics have been the enemy of "Lord of the Rings" ever since that epic fantasy came out, decades ago. …
As a scientist, you are a professional writer: your career is built on successful proposals and papers. Success isn't defined …
Abstract : This chapter presents a healhcareflow mechanism; the intelligence of the mechanism is explored from the perspectives of knowledge …
This book has the potential to fill a real void in the Identity and Access Management industry where practical role …
Issues (Editions)YearIssue2020Volume: 82???Volume: ??????2019Volume: 81???2018Volume: 80???2017Volume: 79???2016Volume: 78???2015Volume: 7712014Volume: 7612013Volume: 75???2012Volume: 74???2011Volume: 73???2010Volume: 72???2009Volume: 71???2008Volume: 70???Volume: 6722007Volume: 69???2006Volume: 68???2005Volume: 67122004Volume: …
Rust's popularity is growing, due in part to features like memory safety, type safety, and thread safety. But these same …
MySQL, an open source relational database management system (RDBMS), can be made highly available to protect from corruption, hardware failure, …
Every business has a reams of business data locked away in databases, business systems, and spreadsheets. While you may be …
This second book in the Stem Cell Repair and Regeneration series provides a deeper exploration of the therapeutic potential of …
Most of the equations governing the problems related to science and engineering are nonlinear in nature. As a result, they …
Animal behavior has long been a battleground between the competing claims of nature and nurture, with the possible role of …
Issues (Editions)YearIssue2020Volume: 6234Volume: ??????2019Volume: 61Volume: 512342018Volume: 51Volume: 4234Volume: ??????2017Volume: 4123Volume: 32342016Volume: 31Volume: 22342015Volume: 21Volume: 11234
Proceedings of the 4th Intl Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, held February 12-14, 2002 …
Creating 2D and 3D charts is one of the most common uses of computer graphics. Such charts can have wide …
This book includes selected papers presented at International Conference on Computational Intelligence, Data Science,, and Cloud Computing (IEM-ICDC 2021), organized …
The ability to reason and think in a logical manner forms the basis of learning for most mathematics, computer science, …
Authentic leadership is an approach to leadership that emphasizes building the leader's legitimacy through honest relationships with followers which value …
This volume is the first of its kind on focusing gamma-ray telescopes. Forty-eight refereed papers provide a comprehensive overview of …
Prepare for success in the classroom! Corresponding to the chapters in the 9th edition of Lewis' market-leading Medical-Surgical Nursing, this …
You’re a proud owner of the bestselling smartphone in the world. Now learn how to make use of all of …
Tenopir (information sciences, U. of Tennessee and Knoxville) and statistician King survey the research related to how engineers gather information …
Clifford Algebras continues to be a fast-growing discipline, with ever-increasing applications in many scientific fields. This volume contains the lectures …
Issues (Editions)YearIssue2020Volume: 5312342019Volume: 5212342018Volume: 511020342017Volume: 5012342016Volume: 4912342015Volume: 4812342014Volume: 4712342013Volume: 4612342012Volume: 4512342011Volume: 4412342010Volume: 4312342009Volume: 4212342008Volume: 4112342007Volume: 4012342006Volume: 3912342005Volume: 3812342004Volume: 3712342003Volume: 3612342002Volume: …
China's increasing power in the global economy is destabilizing the established system. This book analyses the possible historical trajectories of …
In the first edition of this critically acclaimed book, Andrew Hoffman defined the three pillars of application security: reconnaissance, offense, …
Intended for researchers, numerical analysts, and graduate students in various fields of applied mathematics, physics, mechanics, and engineering sciences, Applications …
Issues (Editions)YearIssue2021Volume: ??????2020Volume: 39123456Volume: ??????2019Volume: 3912Volume: 3823456Volume: ??????2018Volume: 391Volume: 38123Volume: 371234562017Volume: 37123Volume: 362562016Volume: 362456Volume: 356Volume: ??????2015Volume: 3612Volume: 35123456Volume: 3416Volume: ??????2014Volume: …
C++ was created as a superset of C, retaining C's efficiency and notational ease but adding type checking, data abstraction, …
Note: The three volumes are not sequential but rather independent of each other and largely self-contained.Basic Matters is a first …
A comprehensive guide to every important component of C# and .NET 6 required to build robust enterprise web applicationsKey FeaturesExplore …
R is the most powerful tool you can use for statistical analysis. This definitive guide smooths R’s steep learning curve …
This version is the updated for Java 8 10th anniversary version printed in 2014. (Second Release) What’s so special about …