25 results (0,19709 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Assessment in Couple Therapy Navigating the 7 Cs of Relationships

The Chinese Machiavelli 3000 Years of Chinese Statecraft

The Chinese Machiavelli 3000 Years of Chinese Statecraft

Machiavelli drew on 2000 years of history to develop theories on how to make war how to win battles and how to gain power and keep it. Using Machiavelli as a springboard Dennis and Ching Ping Bloodworth boldly and adroitly map out 3000 years of Chinese political-military history-from Confucius to Mao Zedong-using Machiavell's discourse of power politics. They reveal a pageantry of Chinese historical figures from wise strategists heroic generals crafty statesmen and ruthless emperors to brave knights-errant and from stately Confucian philosophers to shrewd cunning Legalist thinkers without the usual Confucian restraint. The Chinese Machiavelli intends to help Western readers who may be puzzled by Chinese diplomatic and military strategy understand the principles that have guided both past and present Chinese leaders. For instance why have modern communist Chinese leaders often befriended right-wing European politicians who are out of office rather than left-wing leaders in power? Why did they entertain President Nixon while the United States was at war with North Vietnam? Within the framework of a chronological history concentrating on power politics and using the social and cultural scene as a backdrop the Bloodworths use China's long history to find answers. Peter Li's preface for this new edition explains the structure of the book and offers a penetrating analysis of the authors' style and method. Although The Chinese Machiavelli is authored for the general public rather than for the specialist the latter will also benefit from reading this history. The authors describe the continuity of Chinese history and reveal how knowledge of China's past sheds light on the political behavior of China's rulers today. | The Chinese Machiavelli 3000 Years of Chinese Statecraft

GBP 125.00
1

Shaping Learners’ Pronunciation Teaching the Connected Speech of North American English

Compressive Sensing of Earth Observations

The Charnoly Body A Novel Biomarker of Mitochondrial Bioenergetics

Matrix Inequalities for Iterative Systems

SEND Intervention Planning Provision with Purpose

SEND Intervention Planning Provision with Purpose

The second in The Essential SENCO Toolkit series this resource clarifies and explores the key distinctions between quality first teaching adjustments resources/support and interventions. It allows practitioners to develop their practice effectively and strategically to capture the true impact of SEND provision by shifting the focus from the ‘who and when’ to the ‘what and why’. Chapters also include original frameworks – the 4 Functions of Learning Support – to help with the deployment of teaching assistants and to provide a shared language of support as well as resources that support the application of the 7 Cs Learning Portfolio (introduced in the first book in the series SEND Assessment) and an intervention index to fully understand the purpose and effectiveness of interventions. Key features offered: An introduction to the 4 Functions of Learning Support providing a measurable language of learning support to help practitioners to organise and deploy teaching assistants as part of their SEND provision An intervention index to enable individual or MAT-based SENCOs to capture their own evidence base regarding the purpose and impact of interventions Intervention action cards and targeted outcomes for all 49 themes within the 7 Cs Learning Portfolio A photocopiable and downloadable programme of materials that can be used by readers to gain a better understanding of interventions. SEND Intervention will promote confidence and clarity regarding the rationale for SEND provision. This essential resource provides a practical toolkit to support both new and experienced SENCOs and SEN practitioners. | SEND Intervention Planning Provision with Purpose

GBP 24.99
1

Programming in C++ for Engineering and Science

Japanese Politeness An Enquiry

Atlas of Clinical Dermatology in Coloured Skin A Morphological Approach

Reading Gender Studies on Medieval Manuscripts and Medievalist Movies

Reading Gender Studies on Medieval Manuscripts and Medievalist Movies

This collection brings together twelve essays published between 1988 and 2014 two of which are here translated into English from (respectively) their original French or German. All the essays use gender as the main category of analysis whether of late ancient or early medieval texts or of modern medievalist films. The historical studies of medieval Europe emphasize the use of manuscript-level evidence that is actual sources from the period in question; arguably this approach provides a more accurate understanding of the period than does work done on the basis of printed and edited sources. Furthermore many of the manuscript-based essays specifically exploit liturgical or liturgy-adjacent materials; this is an area of research and a type of manuscript that has rarely been approached through a gendered lens. Meanwhile the cinematic medievalism essays focus on the processes of remediation and adaptation searching specifically for points at which filmmaking teams diverged from their sources as evidence for the main goals of the films (while also attending to production contexts and to reception). The juxtaposition in a single collection of scholarship on medieval manuscripts and modern movies illustrates how period specialists can contribute to conversations in the field of (historical) film studies. The book will be of interest to historians of women gender Christian liturgy medieval Europe medievalism and historical film. (CS 1110). | Reading Gender Studies on Medieval Manuscripts and Medievalist Movies

GBP 120.00
1

The Metabolic Pathway Engineering Handbook Tools and Applications

Integrative Therapies for Depression Redefining Models for Assessment Treatment and Prevention

Computer Architecture Fundamentals and Principles of Computer Design Second Edition

Computer Architecture Fundamentals and Principles of Computer Design Second Edition

Not only does almost everyone in the civilized world use a personal computer smartphone and/or tablet on a daily basis to communicate with others and access information but virtually every other modern appliance vehicle or other device has one or more computers embedded inside it. One cannot purchase a current-model automobile for example without several computers on board to do everything from monitoring exhaust emissions to operating the anti-lock brakes to telling the transmission when to shift and so on. Appliances such as clothes washers and dryers microwave ovens refrigerators etc. are almost all digitally controlled. Gaming consoles like Xbox PlayStation and Wii are powerful computer systems with enhanced capabilities for user interaction. Computers are everywhere even when we don’t see them as such and it is more important than ever for students who will soon enter the workforce to understand how they work. This book is completely updated and revised for a one-semester upper level undergraduate course in Computer Architecture and suitable for use in an undergraduate CS EE or CE curriculum at the junior or senior level. Students should have had a course(s) covering introductory topics in digital logic and computer organization. While this is not a text for a programming course the reader should be familiar with computer programming concepts in at least one language such as C C++ or Java. Previous courses in operating systems assembly language and/or systems programming would be helpful but are not essential. | Computer Architecture Fundamentals and Principles of Computer Design Second Edition

GBP 56.99
1

Get Through MRCOG Part 2: MCQs

Norse Greenland: Viking Peasants in the Arctic

ADHD After Dark Better Sex Life Better Relationship

Introduction to Machine Learning with Applications in Information Security

Introduction to Machine Learning with Applications in Information Security

Introduction to Machine Learning with Applications in Information Security Second Edition provides a classroom-tested introduction to a wide variety of machine learning and deep learning algorithms and techniques reinforced via realistic applications. The book is accessible and doesn’t prove theorems or dwell on mathematical theory. The goal is to present topics at an intuitive level with just enough detail to clarify the underlying concepts. The book covers core classic machine learning topics in depth including Hidden Markov Models (HMM) Support Vector Machines (SVM) and clustering. Additional machine learning topics include k-Nearest Neighbor (k-NN) boosting Random Forests and Linear Discriminant Analysis (LDA). The fundamental deep learning topics of backpropagation Convolutional Neural Networks (CNN) Multilayer Perceptrons (MLP) and Recurrent Neural Networks (RNN) are covered in depth. A broad range of advanced deep learning architectures are also presented including Long Short-Term Memory (LSTM) Generative Adversarial Networks (GAN) Extreme Learning Machines (ELM) Residual Networks (ResNet) Deep Belief Networks (DBN) Bidirectional Encoder Representations from Transformers (BERT) and Word2Vec. Finally several cutting-edge deep learning topics are discussed including dropout regularization attention explainability and adversarial attacks. Most of the examples in the book are drawn from the field of information security with many of the machine learning and deep learning applications focused on malware. The applications presented serve to demystify the topics by illustrating the use of various learning techniques in straightforward scenarios. Some of the exercises in this book require programming and elementary computing concepts are assumed in a few of the application sections. However anyone with a modest amount of computing experience should have no trouble with this aspect of the book. Instructor resources including PowerPoint slides lecture videos and other relevant material are provided on an accompanying website: http://www. cs. sjsu. edu/~stamp/ML/.

GBP 62.99
1

Object-Orientation Abstraction and Data Structures Using Scala

Object-Orientation Abstraction and Data Structures Using Scala

Praise for the first edition: The well-written comprehensive book [is] aiming to become a de facto reference for the language and its features and capabilities. The pace is appropriate for beginners; programming concepts are introduced progressively through a range of examples and then used as tools for building applications in various domains including sophisticated data structures and algorithms Highly recommended. Students of all levels faculty and professionals/practitioners. D. Papamichail University of Miami in CHOICE Magazine Mark Lewis Introduction to the Art of Programming Using Scala was the first textbook to use Scala for introductory CS courses. Fully revised and expanded the new edition of this popular text has been divided into two books. Object-Orientation Abstraction and Data Structures Using Scala Second Edition is intended to be used as a textbook for a second or third semester course in Computer Science. The Scala programming language provides powerful constructs for expressing both object orientation and abstraction. This book provides students with these tools of object orientation to help them structure solutions to larger more complex problems and to expand on their knowledge of abstraction so that they can make their code more powerful and flexible. The book also illustrates key concepts through the creation of data structures showing how data structures can be written and the strengths and weaknesses of each one. Libraries that provide the functionality needed to do real programming are also explored in the text including GUIs multithreading and networking. The book is filled with end-of-chapter projects and exercises and the authors have also posted a number of different supplements on the book website. Video lectures for each chapter in the book are also available on YouTube. The videos show constr

GBP 180.00
1

Architect: The evolving story of a profession

Architect: The evolving story of a profession

The architect’s role is constantly adapting. Throughout history it has shifted significantly shaped by social cultural technological and economic forces. The very definition of what an architect is and does has evolved over time from lead builder or master mason to principal designer. A collaborative and reactive profession it is inextricably linked to the power of the patron whether the client is an influential and affluent individual or a political commercial civic or religious organisation. From Ancient Egypt where architects were members of the ruling class tied into the running of the empire to the 21st century when questions are being raised about the future of the profession this book with its engaging narrative explores the constant threads that remain as the profession adapts. While architects are no longer deified their ability to imagine a new impending reality in built form implies a visionary dimension to their work. By focusing on both the practicalities of the profession and the more intangible motivations behind design – humans’ need to make a mark upon their surroundings – this volume provides a critical overview of over 3000 years of practice and education. Looking at the key questions of where the architectural profession originated in the Western tradition why it is how it is today and where it might be going next the authors postulate that architects’ ability to adapt and reinvent themselves in the past will stand them in good stead for the uncertainties of the future. | Architect: The evolving story of a profession

GBP 32.00
1

Human and Nonhuman Bone Identification A Color Atlas

Human and Nonhuman Bone Identification A Color Atlas

When a bone of unknown origin is found at a location forensic implications arise immediately. Is this bone human and if so is it evidence of a murder? Human and Non-Human Bone Identification: A Color Atlas presents a comprehensive handbook of photographs and other information essential for law enforcement and forensic anthropologists when examining skeletal remains and determining species and body parts. Presenting over 3000 color photographs this atlas is a practical comparative guide to the differences among species for nearly all bones in the body. Useful in either the laboratory or the field it features images of the types of bones that are most commonly discovered and provides annotations pointing out salient features. The book begins with a section on general osteology and explains the major anatomical differences between humans and other animals. It compares human and non-human bones categorized by type of bone and includes most of the major bones in humans and non-humans. The third section discusses non-human skeletal elements categorized by species and explores numerous skeletal elements within those species. This book is also available on a fully searchable DVD: Catalog no. 62964Includes Bones from the Following Species! MooseElkDeerBisonCowAntelopeMountain SheepDomestic SheepLlamaHorseBearWolfCoyoteDomestic dogMountain lionBobcatRaccoonBadgerSkunkRiver OtterBeaverPorcupineMarmotPrairie dogRabbitNorway ratSquirrelArmadilloOpossumVampire batSealWritten by Diane L. France one of the most respected forensic anthropologists in the world this supremely organized atlas helps those tasked with bone identification to quickly and efficiently determine the origin of discovered remains and plan the appropriate course of action. | Human and Nonhuman Bone Identification A Color Atlas

GBP 115.00
1

The Cybersecurity Body of Knowledge The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity

The Cybersecurity Body of Knowledge The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity

The Cybersecurity Body of Knowledge explains the content purpose and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. The discussion focuses on and is driven by the essential concepts of each knowledge area that collectively capture the cybersecurity body of knowledge to provide a complete picture of the field. This book is based on a brand-new and up to this point unique global initiative known as CSEC2017 which was created and endorsed by ACM IEEE-CS AIS SIGSEC and IFIP WG 11. 8. This has practical relevance to every educator in the discipline of cybersecurity. Because the specifics of this body of knowledge cannot be imparted in a single text the authors provide the necessary comprehensive overview. In essence this is the entry-level survey of the comprehensive field of cybersecurity. It will serve as the roadmap for individuals to later drill down into a specific area of interest. This presentation is also explicitly designed to aid faculty members administrators CISOs policy makers and stakeholders involved with cybersecurity workforce development initiatives. The book is oriented toward practical application of a computing-based foundation crosscutting concepts and essential knowledge and skills of the cybersecurity discipline to meet workforce demands. Dan Shoemaker PhD is full professor senior research scientist and program director at the University of Detroit Mercy’s Center for Cyber Security and Intelligence Studies. Dan is a former chair of the Cybersecurity & Information Systems Department and has authored numerous books and journal articles focused on cybersecurity. Anne Kohnke PhD is an associate professor of cybersecurity and the principle investigator of the Center for Academic Excellence in Cyber Defence at the University of Detroit Mercy. Anne’s research is focused in cybersecurity risk management threat modeling and mitigating attack vectors. Ken Sigler MS is a faculty member of the Computer Information Systems (CIS) program at the Auburn Hills campus of Oakland Community College in Michigan. Ken’s research is in the areas of software management software assurance and cybersecurity. | The Cybersecurity Body of Knowledge The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity

GBP 38.99
1

Challenges in Cybersecurity and Privacy - the European Research Landscape

Challenges in Cybersecurity and Privacy - the European Research Landscape

Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT since they present additional vulnerabilities due to their constrained capabilities their unattended nature and the usage of potential untrustworthiness components. Likewise identity-theft fraud personal data leakages and other related cyber-crimes are continuously evolving causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context new holistic approaches methodologies techniques and tools are needed to cope with those issues and mitigate cyberattacks by employing novel cyber-situational awareness frameworks risk analysis and modeling threat intelligent systems cyber-threat information sharing methods advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition novel privacy-preserving techniques and crypto-privacy mechanisms identity and eID management systems trust services and recommendations are needed to protect citizens’ privacy while keeping usability levels. The European Commission is addressing the challenge through different means including the Horizon 2020 Research and Innovation program thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project which aims to cope with digital security and privacy aspects risks threats and cybersecurity issues from a different perspective. Each chapter includes the project’s overviews and objectives the particular challenges they are covering research achievements on security and privacy as well as the techniques outcomes and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely the EU projects analyzed in the book are: ANASTACIA SAINT YAKSHA FORTIKA CYBECO SISSDEN CIPSEC CS-AWARE. RED-Alert Truessec. eu. ARIES LIGHTest CREDENTIAL FutureTrust LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects.

GBP 89.99
1

Discovering Computer Science Interdisciplinary Problems Principles and Python Programming

Discovering Computer Science Interdisciplinary Problems Principles and Python Programming

Havill's problem-driven approach introduces algorithmic concepts in context and motivates students with a wide range of interests and backgrounds. Janet Davis Associate Professor and Microsoft Chair of Computer Science Whitman College This book looks really great and takes exactly the approach I think should be used for a CS 1 course. I think it really fills a need in the textbook landscape. Marie desJardins Dean of the College of Organizational Computational and Information Sciences Simmons University Discovering Computer Science is a refreshing departure from introductory programming texts offering students a much more sincere introduction to the breadth and complexity of this ever-growing field. James Deverick Senior Lecturer The College of William and Mary This unique introduction to the science of computing guides students through broad and universal approaches to problem solving in a variety of contexts and their ultimate implementation as computer programs. Daniel Kaplan DeWitt Wallace Professor Macalester College Discovering Computer Science: Interdisciplinary Problems Principles and Python Programming is a problem-oriented introduction to computational problem solving and programming in Python appropriate for a first course for computer science majors a more targeted disciplinary computing course or at a slower pace any introductory computer science course for a general audience. Realizing that an organization around language features only resonates with a narrow audience this textbook instead connects programming to students’ prior interests using a range of authentic problems from the natural and social sciences and the digital humanities. The presentation begins with an introduction to the problem-solving process contextualizing programming as an essential component. Then as the book progresses each chapter guides students through solutions to increasingly complex problems using a spiral approach to introduce Python language features. The text also places programming in the context of fundamental computer science principles such as abstraction efficiency testing and algorithmic techniques offering glimpses of topics that are traditionally put off until later courses. This book contains 30 well-developed independent projects that encourage students to explore questions across disciplinary boundaries over 750 homework exercises and 300 integrated reflection questions engage students in problem solving and active reading. The accompanying website — https://www. discoveringcs. net — includes more advanced content solutions to selected exercises sample code and data files and pointers for further exploration. | Discovering Computer Science Interdisciplinary Problems Principles and Python Programming

GBP 74.99
1

Energy Audit of Building Systems An Engineering Approach Third Edition

Energy Audit of Building Systems An Engineering Approach Third Edition

Updated to include recent advances this third edition presents strategies and analysis methods for conserving energy and reducing operating costs in residential and commercial buildings. The book explores the latest approaches to measuring and improving energy consumption levels with calculation examples and Case Studies. It covers field testing energy simulation and retrofit analysis of existing buildings. It examines subsystems—such as lighting heating and cooling—and techniques needed for accurately evaluating them. Auditors managers and students of energy systems will find this book to be an invaluable resource for their work. Explores state-of-the-art techniques and technologies for reducing energy combustion in buildings. Presents the latest energy efficiency strategies and established methods for energy estimation. Provides calculation examples that outline the application of the methods described. Examines the major building subsystems: lighting heating and air-conditioning. Addresses large-scale retrofit analysis approaches for existing building stocks. Introduces the concept of energy productivity to account for the multiple benefits of energy efficiency for buildings. Includes Case Studies to give readers a realistic look at energy audits. Moncef Krarti has vast experience in designing testing and assessing innovative energy efficiency and renewable energy technologies applied to buildings. He graduated from the University of Colorado with both MS and PhD in Civil Engineering. Prof. Krarti directed several projects in designing energy-efficient buildings with integrated renewable energy systems. He has published over 3000 technical journals and handbook chapters in various fields related to energy efficiency distribution generation and demand-side management for the built environment. Moreover he has published several books on building energy-efficient systems. Prof. Krarti is Fellow member to the American Society for Mechanical Engineers (ASME) the largest international professional society. He is the founding editor of the ASME Journal of Sustainable Buildings & Cities Equipment and Systems. Prof. Krarti has taught several different courses related to building energy systems for over 20 years in the United States and abroad. As a professor at the University of Colorado Prof. Krarti has been managing the research activities of an energy management center at the school with an emphasis on testing and evaluating the performance of mechanical and electrical systems for residential and commercial buildings. He has also helped the development of similar energy efficiency centers in other countries including Brazil Mexico and Tunisia. In addition Prof. Krarti has extensive experience in promoting building energy technologies and policies overseas including the establishment of energy research centers the development of building energy codes and the delivery of energy training programs in several countries. | Energy Audit of Building Systems An Engineering Approach Third Edition

GBP 125.00
1