This sociological text on deviance and difference provides an exploration into unconventional individuals and their place in "normal" society.
Few students studying computer science or computer engineering will ever have the opportunity to build a computer system. On the …
You are a Badass: by Jen Sincero | Key Takeaways, Analysis & Review You are a Badass: How to Stop …
The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book …
Advanced Grammar in Use contains 120 units of grammar explanation and practice exercises. The book provides coverage of those language …
Delve into the world of offensive cybersecurity as you master Bash, a fundamental language for expert penetration testers. Unleash its …
For the upcoming 400th anniversary of one of literature's greatest novels, a celebration of its most unforgettable passages A browser's …
A fast, hands-on introduction to offensive hacking techniques. Hands-On Hacking teaches readers to see through the eyes of their adversary …
Systems Engineering Principles and Practice is a national standard textbook for the study of traditional systems engineering for advanced undergraduate …
"Puritan\nRomance\nsin\nGuilt\nRedemption"
Master the capabilities of PostgreSQL 15 to efficiently administer and maintain your database.Purchase of the print or Kindle book includes …
Why this book is unlike any book you’ve ever read Most software development books are about…software development— this one isn’t. …
Score your highest in corporate finance The math, formulas, and problems associated with corporate finance can be daunting to the …
Do You Want To Learn How To Save Time And Money In The Kitchen And Lose Weight At The Same …
Recognized as the most authoritative general account of Indonesia, the world's fourth most populous nation, from the coming of Islam …
WORD SMART The words you use say a lot about you. Some words say that you are smart, persuasive, and …
A major new translation of one of the most enduring works of literature from the award- winning, bestselling translator of …
As pop culture, games are as important as film or television--but game design has yet to develop a theoretical framework …
The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics …
The definitive book on improving healthcare quality, this book compiles the most current information on a vast array of quality …
This book is an all-in-one source of information for programming the Second-Generation Intel Xeon Phi product family also called Knights …
Blood Meridian (1985), Cormac McCarthy's epic tale of an otherwise nameless "kid" who in his teens joins a gang of …
This textbook introduces methods of accelerating transient stability (dynamic) simulation and electromagnetic transient simulation on massively parallel processors for large-scale …
This edition is written in English. However, there is a running German thesaurus at the bottom of each page for …
""In this 1958 thought-provoking novel, Aldous Huxley revisits the dystopian world he first explored in his classic "Brave New World". …
"Get ready to accelerate your online experience with Web Content Caching and Distribution [8th Intl Wkshp] by Yuli Vasiliev! This …
Guide to Tactical Perimeter Defense examines the critical defensive technologies needed to secure network perimeters. Written to map to the …
Release 3rd EditionAugust 2012by Peter Wentworth, Jeffrey Elkner, Allen B. Downey, and Chris MeyersThis book owes its existence to the …
""Embark on a linguistic journey to Middle-earth with 'A Gateway to Sindarin', a groundbreaking reference guide to the Sindarin Elvish …
In the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practical Guide …
nlock AI Mastery with Our Comprehensive 2-in-1 Guide Curious about artificial intelligence but unsure where to start? Our dual book …
Why do the stars shine? What messages can we read in the light they send to us from the depths …
Get up to speed on Git for tracking, branching, merging, and managing code revisions. Through a series of step-by-step tutorials, …
Python Algorithms, 2nd Edition explains the Python approach to algorithm analysis and design. Written by Magnus Lie Hetland, author of …
Critiquing the Western discourse of global extinction and biodiversity Revenant Ecologies promotes new ways of articulating the ethical enormity of …
Spanning disciplines from biology to cosmology, chemistry to psychology to physics, Michael Brooks thrillingly captures the excitement of scientific discovery.Science’s …