Electronic Books

Total Books: 161 - 177 /177
NoIMG
Stufish - Entertainment Architecture (Architectural Design) / Ray Winkler, Neil Spiller

Looks at the work of STUFISH Entertainment Architects. Founded by the late Mark Fisher, the legendary British architect known ...

Weiterlesen
The Art of Attack: Attacker Mindset for Security Professionals / Maxie Reynolds

Untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and ...

Weiterlesen
The Fundamental Elements of Strategy Concepts, Theories and Cases

This book clarifies confusions of strategy that have existed for nearly 40 years through the core thoughts of three fundamental ...

Weiterlesen
The Lace Expansion and its Applications

The lace expansion is a powerful and flexible method for understanding the critical scaling of several models of interest ...

Weiterlesen
The Lace Expansion and its Applications

The lace expansion is a powerful and flexible method for understanding the critical scaling of several models of interest ...

Weiterlesen
The Linearization Of Affixes: Evidence From Nuu-Chah-Nulth

The linearization of syntactic constructs stands at the forefront of current research on the syntax-phonology interface. ...

Weiterlesen
The Self-Taught Computer Scientist: The Beginner's Guide to Data Structures & Algorithms / Cory Althoff

Introduces beginner and self-taught programmers to computer science fundamentals that are essential for success in programming ...

Weiterlesen
The Third Sector as a Renewable Resource for Europe

This book provides a critical account of the third sector and its future in Europe. It offers an original conceptualization ...

Weiterlesen
NoIMG
Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks / Chris Peiris, Binil Pillai, Abbas Kudrati

You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services ...

Weiterlesen
Transactions on Data Hiding and Multimedia Security I

This inaugural issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...

Weiterlesen
Transactions on Data Hiding and Multimedia Security II

This second issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...

Weiterlesen
Transactions on Data Hiding and Multimedia Security III

The first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...

Weiterlesen
Trattamento del distacco retinico primario

Questo compendio, ricco di informazioni, rappresenta per il moderno chirurgo vitreo-retinico una guida basilare. Esperti ...

Weiterlesen
Trauma and Resilience Among Displaced Populations A Sociocultural Exploration

This book provides an enriched understanding of historical, collective, cultural, and identity-related trauma, emphasising ...

Weiterlesen
Ubiquitous Convergence Technology

Ubiquitous computing is already with us and is changing our lifestyle, way of thinking and quality of life. Everyday objects ...

Weiterlesen
Vitreoretinal Surgery

Covers the most common diseases with appropriate approaches to various vitreoretinal problems. This illustrated guide explains ...

Weiterlesen
NoIMG
Women, Migration and Gendered Experiences : The Case of Post-1991 Albanian Migration

This book focuses on Albanian internal and international female migration and places gender at the heart of postsocialist ...

Weiterlesen
Total Books: 161 - 177 /177