Millions have seen the movie and thousands have read the book but few have fully appreciated the mathematics invented by …
Any programmer working with a dynamically typed language will tell you how hard it is to scale to more lines …
This second volume of The Cambridge History of the Gothic provides a rigorous account of the Gothic in British, American …
Get a firm grip on the core processes including browser automation, web scraping, Word, Excel, and GUI automation with Python …
On publication Arundhati Roy's first novel The God of Small Things (1997) rapidly became an international bestseller, winning the Booker …
""Get ready to be transported to a world of Gothic horror and suspense with Frankenstein's Bride, a chilling tale by …
Stephen Whicher's Freedom and Fate begins with a tribute to Ralph Rusk's monumental biography The Life of Ralph Waldo Emerson, …
"Here is a copyrighted, SEO-optimized description for the book "One Hundred Years of Solitude Cliffs Notes Study (Notes)" by Carl …
This book constitutes the conference proceedings of the 5th International Conference on Algorithmic Decision Theory , ADT 2017, held in …
Does social media marketing signal the death of advertising, or its rebirth? Or is it merely the trend of the …
Intro; Title Page; Copyright; Dedication; Contents; Introduction to the Paperback Edition; Introduction: A Navajo Hope; 1. Mars Wars; 2. The …
Future computing professionals must become familiar with historical computer architectures because many of the same or similar techniques are still …
Attacking Network Protocols is a deep dive into network protocol security from James -Forshaw, one of the world's leading bug …
The mutually energizing and often volatile friendship between Eleanor Roosevelt and Adlai Stevenson--unexplored in depth by scholars until this study--was …
The year 2012 marks the 50th anniversary of the publication of Thomas S. Kuhn'sThe Structure of Scientific Revolutions. Up until …
Covering 16.10, 17.04, 17.10 Book + Content Update Program Ubuntu Unleashed 2017 Edition is filled with unique and advanced information …
This textbook offers a unified, self-contained introduction to the field of term rewriting. Baader and Nipkow cover all the basic …
"During a time of political instability in the highest echelons of the imperial court, Ambassador Mahit Dzmare arrives in the …
"The seminal guide to the new morality of personal money management" (Los Angeles Times(on the first edition))In an age of …
The design and analysis of efficient data structures has long been recognized as a key component of the Computer Science …
Winnie-the-Pooh might not know it, but feng shui is about what Bears do Best - living in harmony with their …
The few last people who read this book are most likely in their grave. It had to be a garage …
This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses …
Manning's bestselling Java 8 book has been revised for Java 9! In Modern Java in Action, readers build on their …
This book aims to present the history and developments of particle physics from the introduction of the notion of particles …
Life's Missing Instruction ManualEpictetus (c. 50-135 CE) was brought as a slave to Rome, where he became a great teacher, …
The Blackwell Companion to Christian Ethics presents an innovative exposition of Christian ethics, seen through the lens of Christian worship. …
This is a new study of speakers of official, minority and disputed languages in an ever-changing European context. Broad policy …
Cybersecurity for Beginners is an engaging introduction to the field of cybersecurity. You'll learn how attackers operate, as well as …
For anyone who has ever wondered how computers solve problems, an engagingly written guide for nonexperts to the basics of …
The media frenzy surrounding the 1996 resolution by the Oakland School Board brought public attention to the term "Ebonics", however …
Sufism is a religion which emphasizes direct knowledge of the divine within each person, and meditation, music, song, and dance …
Attacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the world’s leading bug …
Learn how you can perform named entity recognition using HuggingFace Transformers and spaCy libraries in Python. Named Entity Recognition (NER) …
Have you ever wished you could peer into someone’s mind to find out what he or she is really thinking? …
From the preeminent historian of Europe in the eighteenth and nineteenth centuries comes a superb, concise account of a cultural …
What is the role of scientists in society? What should we think when they talk about more than just science? …
A practical field guide to the practice of scrum, an agile software project management methodology.