Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Scientific Computing and Cultural Heritage: Contributions in Computational Humanities (Contributions in Mathematical and Computational Sciences)
Scientific Computing and Cultural Heritage: Contributions in Computational Humanities (Contributions in Mathematical and Computational Sciences)

The sheer computing power of modern information technology is changing the face of research not just in science, technology and mathematics, but in humanities and cultural studies too. Recent decades have seen a major shift both in attitudes and deployment of computers, which are now vital and highly effective tools in disciplines where they...

The Heartland: An American History
The Heartland: An American History
A history of a quintessentially American place--the rural and small town heartland--that uncovers deep yet hidden currents of connection with the world.

When Kristin L. Hoganson arrived in Champaign, Illinois, after teaching at Harvard, studying at Yale, and living in the D.C. metro area with various stints overseas,
...
Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all...

Nick Drake: Dreaming England (Reverb)
Nick Drake: Dreaming England (Reverb)

 Since his death in 1974 at the age of twenty-six, singer-songwriter Nick Drake has gained a huge international audience and come to be thought of as the epitome of English romanticism. But while his small body of work has evoked poetic comparisons with Blake and Keats, closer inspection of Drake’s music reveals many global and...

Dictionaries in Early Modern Europe: Lexicography and the Making of Heritage
Dictionaries in Early Modern Europe: Lexicography and the Making of Heritage

Dictionaries tell stories of many kinds. The history of dictionaries, of how they were produced, published and used, has much to tell us about the language and the culture of the past. This monumental work of scholarship draws on published and archival material to survey a wide range of dictionaries of western European languages (including...

Digital Privacy and Security Using Windows: A Practical Guide
Digital Privacy and Security Using Windows: A Practical Guide

Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques.

This book teaches you how to secure your online identity and personal...

The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems (Wireless Networks and Mobile Communications)
The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems (Wireless Networks and Mobile Communications)
Ubiquitous and pervasive technologies such as RFID and smart computing promise a world of networked and interconnected devices. Everything from tires to toothbrushes could soon be in communications range, heralding the dawn of an era in which today's Internet of People gives way to tomorrow's Internet of Things where billions of...
Sensory Marketing
Sensory Marketing
This book has its origins in our shared interest in sensory marketing. It began in June 2006 with an idea for a research project at the Baltic Business School (BBS) at Kalmar University, Sweden. It was obvious to us that most marketers had long overlooked the signifi cance of the human senses in...
Developer's Workshop to COM and ATL 3.0
Developer's Workshop to COM and ATL 3.0
Learn how to build sophisticated COM objects using C++ and IDL, as well as how ATL supplies support for several COM procedures.

Microsoft’s Component Object Model is one of the most important concepts in software development today. Developer’s Workshop to COM and ATL 3.0 provides an in-depth treatment of COM and shows...

How Personal & Internet Security Works (How It Works)
How Personal & Internet Security Works (How It Works)

In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft...

Directing, Fourth Edition: Film Techniques and Aesthetics (Screencraft Series)
Directing, Fourth Edition: Film Techniques and Aesthetics (Screencraft Series)
Directing: Film Techniques and Aesthetics is a comprehensive manual that has inspired tens of thousands of readers worldwide to realize their artistic vision and produce well-constructed films. Filled with practical advice on every stage of production, this is the book you will return to throughout your career.

Directing covers the
...
Before Auschwitz: Irène Némirovsky and the Cultural Landscape of Inter-war France (Routledge Studies in Twentieth-Century Literature)
Before Auschwitz: Irène Némirovsky and the Cultural Landscape of Inter-war France (Routledge Studies in Twentieth-Century Literature)

This book analyses Irene Némirovsky’s literary production in its relationship to the literary and cultural context of the inter-war period in France. It examines topics of central importance to our understanding of the literary field in France in the period, such as: the close relationship between politics and literature; the...

unlimited object storage image
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy