



Ancient Scholarship and Grammar: Archetypes, Concepts and Contexts
The volume aims at investigating archetypes, concepts and contexts of the ancient philological discipline from a historical, methodological and ideological perspective. It includes 26 contributions by leading scholars divided into four sections: The ancient scholars at work, The ancient grammarians on Greek language and linguistic...   Metric Embeddings (de Gruyter Studies in Mathematics)
Embeddings of discrete metric spaces into Banach spaces recently became an important tool in computer science and topology. The book will help readers to enter and to work in this very rapidly developing area having many important connections with different parts of mathematics and computer science.
The purpose of the book is to...   DIJK VAN:DISTRIBUTION THEORY GTB (De Gruyter Graduate Lectures)
The theory of distributions has numerous applications and is extensively used in mathematics, physics and engineering. There is however relatively little elementary expository literature on distribution theory. This book is intended as an introduction. Starting with the elementary theory of distributions, it proceeds to convolution products... 



Handbook of Business Communication (Handbooks of Applied Linguistics)
In spite of the daytoday relevance of business communication, it remains underrepresented in standard handbooks and textbooks on applied linguistics. The present volume introduces readers to a wide variety of linguistic studies of business communication, ranging from traditional LSP approaches to contemporary discoursebased work, and from...   Learning PowerShell
Learning PowerShell is a custombuilt, handcrafted, painstakingly curated book designed to get you from total PowerShell newbie to confident PowerShell user in as little as four weeks. This book assumes no prior knowledge, perfect for nondevelopers and Gui addicts who recognize that PowerShell is the future but need a good bit of handholding...   IoT Security Issues
IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack... 


Result Page: 2 1 