|
Showing 1 - 25 of
32 matches in All Departments
Offers accessible, clear and easy-to-read explanations of the key
issues and concepts within Constitutional and Administrative Law,
presented in a student-friendly format Fills a gap in the market
between revision guides and big overwhelming textbooks - ideal for
the first-time student of law The innovative pedagogical approach
in the Unlocking series builds and consolidates understanding of
each topic incrementally, providing extracts from key cases and
judgments and secondary sources to help students to contextualise
their learning. The fifth edition has been extensively updated,
including a new chapter covering the constitutional impact of the
COVID pandemic.
Offers accessible, clear and easy-to-read explanations of the key
issues and concepts within Constitutional and Administrative Law,
presented in a student-friendly format Fills a gap in the market
between revision guides and big overwhelming textbooks - ideal for
the first-time student of law The innovative pedagogical approach
in the Unlocking series builds and consolidates understanding of
each topic incrementally, providing extracts from key cases and
judgments and secondary sources to help students to contextualise
their learning. The fifth edition has been extensively updated,
including a new chapter covering the constitutional impact of the
COVID pandemic.
Make calculus more manageable with simplified instruction and tons
of practice Calculus All-in-One For Dummies pairs no-nonsense
explanations of calculus content with practical examples and
practice problems, so you can untangle the difficult concepts and
improve your score in any calculus class. Plus, this book comes
with access to chapter quizzes online. Dummies makes
differentiation, integration, and everything in between more
manageable, so you can crush calculus with confidence. Review the
foundational basics, then dive into calc lessons that track your
class. This book takes you through a full year of high-school
calculus or a first semester of college calculus, only explained
more clearly. Work through easy-to-understand lessons on everything
in a typical calc class Get the score you want and need on
standardized tests like AP Calculus Access online chapter quizzes
for additional practice Untangle tricky problems and discover
clever ways to solve them With clear definitions, concise
explanations, and plenty of helpful information on everything from
limits and vectors to integration and curve-sketching, Calculus
All-in-One For Dummies is the must-have resource for students who
want to review for exams or just need extra help understanding the
concepts from class.
It is widely acknowledged that we have a duty to protect the
environment. Yet, current environmental policy discussions
demonstrate that fulfilling this in practice is a difficult,
complex, and costly task. There are many ethical questions arising
from such discussions. Should we care about the environment because
it is economically valuable or because nature has intrinsic value?
How do we establish an ethical trade-off between our current needs
and those of future generations? Should we protect individual
species or entire ecosystems instead? What way should we discuss
societal values and ideals, or should scientific analysis take
precedence within decision making practice? This book aims to
tackle some of these thorny sustainability issues and responds to
them with a cohesive, original alternative in the form of the
precautionary ecosystem health principle (PEHP). It provides a
detailed philosophical approach and advocates that a PEHP approach
is able to overcome many of these stark and challenging
difficulties within sustainability theory and environmental policy.
It is widely acknowledged that we have a duty to protect the
environment. Yet, current environmental policy discussions
demonstrate that fulfilling this in practice is a difficult,
complex, and costly task. There are many ethical questions arising
from such discussions. Should we care about the environment because
it is economically valuable or because nature has intrinsic value?
How do we establish an ethical trade-off between our current needs
and those of future generations? Should we protect individual
species or entire ecosystems instead? What way should we discuss
societal values and ideals, or should scientific analysis take
precedence within decision making practice? This book aims to
tackle some of these thorny sustainability issues and responds to
them with a cohesive, original alternative in the form of the
precautionary ecosystem health principle (PEHP). It provides a
detailed philosophical approach and advocates that a PEHP approach
is able to overcome many of these stark and challenging
difficulties within sustainability theory and environmental policy.
To walk among the age-old trees of the wildwood is to journey back
in time, to a place of great simplicity and deep understanding. In
this re-awakening of the original Greenwood Tarot, Mark Ryan and
John Matthews introduce us to the classic forest archetypes of the
Green Man and Woman, the Archer, the Hooded Man and the Blasted
Oak. Will Worthington's rich and vivid images bring this ancient
world to life and make it possible to feel the magic and power of
the wildwood. The Wildwood Tarot draws inspiration from pre-Celtic
mythology and a belief system steeped in shamanic wisdom and forest
lore. Based on the seasonal rhythm and festivals of the ancient
year, it connects us with a long-lost world - one that can help us
to make sense of our own.
Most businesses are far more interested in accurate forecasting and
fraud detection using their existing structured datasets than
identifying cats in YouTube videos. Powerful deep learning
techniques can efficiently extract insight from the kind of
structured data collected by most businesses and organisations.
Deep learning offers the potential to identify complex patterns and
relationships hidden in data of all sorts. Deep Learning with
Structured Data shows you how to apply powerful deep learning
analysis techniques to the kind of structured, tabular data you'll
find in the relational databases that real-world businesses depend
on. Filled with practical, relevant applications, this book teaches
you how deep learning can augment your existing machine learning
and business intelligence systems. * The benefits and drawbacks of
deep learning * Organizing data for your deep learning model * The
deep learning stack * Measuring performance of your models For
readers with an intermediate knowledge of Python, Jupyter
notebooks, and machine learning.
|
Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings (Paperback, 1st ed. 2017)
Matteo Maffei, Mark Ryan
|
R2,382
Discovery Miles 23 820
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the 6th International
Conference on Principles of Security and Trust, POST 2017, which
took place in Uppsala, Sweden in April 2017, held as Part of the
European Joint Conferences on Theory and Practice of Software,
ETAPS 2017. The 14 papers presented in this volume were carefully
reviewed and selected from 40 submissions. They were organized in
topical sections named: information flow; security protocols;
security policies; and information leakage.
Recent years have seen the development of powerful tools for
verifying hardware and software systems, as companies worldwide
realise the need for improved means of validating their products.
There is increasing demand for training in basic methods in formal
reasoning so that students can gain proficiency in logic-based
verification methods. The second edition of this successful
textbook addresses both those requirements, by continuing to
provide a clear introduction to formal reasoning which is both
relevant to the needs of modern computer science and rigorous
enough for practical application. Improvements to the first edition
have been made throughout, with extra and expanded sections on SAT
solvers, existential/universal second-order logic, micro-models,
programming by contract and total correctness. The coverage of
model-checking has been substantially updated. Further exercises
have been added. Internet support for the book includes worked
solutions for all exercises for teachers, and model solutions to
some exercises for students.
The10thInternationalConferenceonInformationandCommunicationsSecurity
(ICICS) was held in Birmingham, UK, during 20-22 October 2008. The
ICICS conference series is an established forum that brings
together people working in di?erent ?elds of information and
communications security from universities, researchinstitutes,
industryandgovernmentinstitutions, andgivestheattendees the
opportunity to exchange new ideas and investigate state-of-the-art
devel- ments. In previous years, ICICS has taken place in China
(2007, 2005, 2003, 2001, 1997), USA (2006), Spain (2004), Singapore
(2002), and Australia (1999). On each occasion, as on this one, the
proceedings were published in the Springer LNCS series. In total,
125 papers from 33 countries were submitted to ICICS 2008, and 27
were accepted covering multiple disciplines of information security
and applied
cryptography(acceptancerate22%).EachsubmissiontoICICS2008wasano-
mously reviewed by three or four reviewers. We are grateful to the
Programme Committee,
whichwascomposedof57membersfrom12countries;wethankthem
aswellasallexternalrefereesfortheirtimeandvaluedcontributionstothetough
andtime-consuming reviewingprocess. In addition to the contributed
speakers, the programme also featured three invitedspeakers.We
aregratefulto JoshuaGuttman (The MITRE Corporation, USA), Peng Ning
(North Carolina State University, USA), and Nigel Smart (University
of Bristol, UK) for accepting our invitation to speak. ICICS 2008
was organised by the University of Birmingham and Hewlett Packard
Laboratories. We gratefully acknowledge sponsorship from the UK -
gineering and Physical Sciences Research Council (EPSRC), as well
as Hewlett Packard and the University of Birmin
|
Objects, Agents, and Features - International Seminar, Dagstuhl Castle, Germany, February 16-21, 2003, Revised and Invited Papers (Paperback, 2004 ed.)
Mark Ryan, John-Jules Ch. Meyer, Hans-Dieter Ehrich
|
R1,529
Discovery Miles 15 290
|
Ships in 10 - 15 working days
|
In recent years, concepts in object-oriented modeling and
programming have been extended in several directions, giving rise
to new paradigms such as age- orientation and feature-orientation.
This volume came out of a Dagstuhl seminar exploring the
relationship - tween the original paradigm and the two new ones.
Following the success of the seminar, the idea emerged to edit a
volume with contributions from parti- pants - including those who
were invited but could not come. The participants' reaction was
very positive, and so we, the organizers of the seminar, felt -
couraged to edit this volume. All submissions were properly
refereed, resulting in the present selection of high-quality papers
in between the topics of objects, agents and features. The editors
got help from a number of additional reviewers, viz. Peter
Ahlbrecht, Daniel Amyot, Lynne Blair, Jan Broersen, Mehdi Dastani,
Virginia Dignum, Dimitar Guelev, Benjamin Hirsch, Maik Kollmann,
Alice Miller, Stephan Rei?-Marganiec, Javier Vazquez-Salceda, and
Gerard Vreeswijk. Finally, we would like to take this opportunity
to thank all the persons -
volvedintherealizationoftheseminarandthisbook: attendees, authors,
revi- ers, and, last but not least, the sta? from Schloss Dagstuhl
and Springer-Verlag. February 2004 The Editors TableofContents
Objects, Agents, and Features: An Introduction. . . . . . . . . . .
. . . . . . . . . . . . . 1 John-Jules Ch. Meyer, Mark D. Ryan, and
Hans-Dieter Ehrich Coordinating Agents in OO . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Frank
S. de Boer, Cees Pierik, Rogier M. van Eijk, and John-Jules Ch.
Meyer On Feature Orientation and on Requirements Encapsulation
Using Families of Requirements. . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . 26 Jan Bredereke Detecting
Feature Interactions: How Many Components Do We Need?. . . .
A feature is a small modification or extension of a system which
can be seen as having a self-contained functional role, such as
Call Forwarding, Automatic Call back and Voice Mail in telephone
services, to which users can subscribe. Feature interaction happens
when one feature modifies or subverts the operation of another, and
this problem has received a great deal of attention from industry
and academics, especially in the field of telecommunications, where
new services are constantly being developed and deployed. This
volume contains refereed papers resulting from the ESPRIT FIREworks
working group. The papers focus on the language constructs which
have been developed describing features, and advocate a
feature-oriented approach to software design including requirements
specification languages and verifications logics.
This volume contains the proceedings of the fIrst workshop held by
the Theory and Formal Methods Section ofthe Imperial College
Department of Computing. It contains papers from almost every
member of the Section, from our long-term academic visitors, and
from those who have recently left us. The papers fall into four
broad areas: * semantics * concurrency * logic * specification with
some papers spanning a number of disciplines. The subject material
varies from work on mathematical foundations to practical
applications of this theory, expressing the Section's commitment to
both the foundations of computer science, and the application of
theory to real computing problems. In preparing the workshop and
these proceedings, care was taken to ensure that there were papers
overviewing a field, as well as ones whose primary aim was to
present new scientifIc results. This had a dual purpose: to bring
our Section members up to speed in some of the areas being worked
on by the Section; and to provide the reader of the proceedings not
only with a good introduction to many of the specifIc areas being
investigated by the Section, but also with details of some of our
latest results. All the papers presented at the workshop were
revised following comments made by the workshop participants, and
all were subsequently reviewed by at least two people before
producing the fInal versions contained in this volume.
|
Information Security Practice and Experience - 16th International Conference, ISPEC 2021, Nanjing, China, December 17-19, 2021, Proceedings (Paperback, 1st ed. 2021)
Robert Deng, Feng Bao, Guilin Wang, Jian Shen, Mark Ryan, …
|
R2,223
Discovery Miles 22 230
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 16th
International Conference on Information Security Practice and
Experience, ISPEC 2021, held in Nanjing, China, in December 2021.
The 23 full papers presented in this volume were carefully reviewed
and selected from 94 submissions. The conference focus on new
information security technologies, including their applications and
their integration with IT systems in various vertical sectors.
|
Robin Hood (Paperback)
John Matthews; Preface by Mark Ryan; Foreword by Richard Carpenter
|
R332
R271
Discovery Miles 2 710
Save R61 (18%)
|
Ships in 9 - 15 working days
|
The identity of Robin Hood has been questioned many times since the
Outlaw of Sherwood first sprang to fame in the twelfth century. No
two authorities seem able to agree as to his origins, antecedents,
or even whether or not he was a historical personage or a mythical
figure. Historians, both amateur and professional, have for years
been bringing out new books in which they claim to have found 'the
real Robin Hood', but his identity remains clouded. More recent
studies have sought to push the boundaries of the story further out
into recorded time - seeking Robin Hood among the records of
government and law enforcement, in the ballads of the twelfth to
fourteenth centuries, and in the folk memory of the people of
Britain. For them, Robin is a product of the ballad-maker's muse,
or a literary fabrication based on the lives and deeds of several
outlaws or the garbled memory of an actual person whose real life
bore little or no resemblance to the romanticised songs of the
ballad-makers. This is the only contemporary book to fully explore
the mythology of Robin Hood rather than concentrating on the human
identity of the famous outlaw. It ties Robin to the ancient
archetype of the Green Man, the lore and legends of the Faery race,
to the possible Eastern influence of the English Mummers' plays,
and suggests the real identities of several of the Merry Men.
What would you do if you were struck by an enemy bullet in wartime,
then realised you were still alive? For most of us, that would be
the end of our fight. If we were capable of thought while we tried
to cope with the pain, we'd probably hope to be rushed to hospital
so that someone could save our lives. But a hundred years ago, in
the opening battle of the First World War at Mons, two young men
didn't react like that. Lieutenant Maurice Dease and Private Sidney
Godley, born only weeks apart into sharply contrasting worlds,
shared the same defiance and steely streak. Without a thought for
themselves, they went back into the action for more, sustaining
dreadful wounds in the process. One man died, the other lived -
pieced back together painstakingly by the Germans, who had taken
many casualties of their own while overrunning the British
position. Together, and against the odds, Dease and Godley became
the first winners of the Victoria Cross in the First World War.
Here Mark Ryan uses contemporary documentation and images to tell
their astounding, fascinating stories, putting the focus on two
genuine and ordinary heroes of the Great War.
Maurice 'Moggy' Mayne was a cricket-loving air gunner in the Second
World War, with a pretty girlfriend back home in rural England. His
turret was in a Bristol Beaufort and his pilot had to fly with
almost suicidal bravery at giant German warships before releasing
the torpedo. No wonder Moggy's first pilot cracked up and his
second liked to drink. When he was shot down, Moggy miraculously
survived - unlike his best friend Stan. Moggy was sent to Stalag
Luft VIIIB, an infamous German POW camp near the Polish border,
where he was badly treated. Fearing losing his beloved girlfriend
Sylvia forever, and risking recapture and execution, he saw the
chance to escape alone, thus beginning an epic journey through
Nazi-occupied Germany. As the Gestapo shot other escaped British
servicemen, Moggy Mayne came agonisingly close to lasting freedom.
Instead, as the war neared its end, he had to face the horrors of
the 'long march' west - and he felt his life slipping away. Would
he ever see his Sylvia again?
This is a complete practical guide to choosing and specifying
Holley carburetors for any suitable engine and for road or track
performance. Uniquely, allows the identification of complete
secondhand carburetors and individual components, including all
metering blocks. Easy to follow tuning instructions to ensure your
Holley carburetor delivers maximum performance. Comprehensive guide
to secondhand carburetor identification. Comprehensive guide to
individual component identification. Unique guide to categorizing
specification of metering blocks. Unique and easy to follow tuning
sequence for four barrel carburetors. Easy to follow tuning
sequence for two barrel carburetors.
Mathematik muss nicht dröge und schwer verständlich sein,
manchmal kann sie sogar ein bisschen Spaß machen. Thoralf Räsch
vermittelt Ihnen die Grundlagen, die alle Naturwissenschaften
benötigen: Algebra, Analysis, Differentiation, Integration,
Differentialgleichungen, Lineare Algebra, Statistik,
Wahrscheinlichkeitsrechnung und Hypothesentests. Anhand vieler
Tipps und Praxisbeispiele lernen Sie, wie die erworbenen Kenntnisse
in den Naturwissenschaften angewendet werden. Dieses Buch richtet
sich an Studierende aller Naturwissenschaften ? sowohl zum Lernen
als auch zum Nachschlagen.
Want to delve deeper into the concepts that made The Wildwood Tarot
wildly popular? This workbook further explores those powerful
ancient traditions. Wild Magic invokes the power of the Wildwood -
the Green Man and Green Woman, as well as all the living archetypes
of the forest, such as Herne the Hunter and Robin-in-the-Hood.
Journey across time to the pre-Celtic world where primal forces, in
the guise of animal, bird, and fish, roamed free and opened
doorways into the otherworld of the Ancestors. With chapters on the
Lore of the Wild, the Wheel of the Year, shamanic methods of
examining the wild, and meditations designed to enable personal
encounters with Wildwood archetypes, as well as newly crafted
rituals enabling readers to celebrate festivals such as the
Midsummer and Midwinter Solstices, the book takes a fresh and
informed look at a set of ancient traditions applied to the
present.
Harness the power of the easy-to-use, high-performance fastai
framework to rapidly create complete deep learning solutions with
few lines of code Key Features Discover how to apply
state-of-the-art deep learning techniques to real-world problems
Build and train neural networks using the power and flexibility of
the fastai framework Use deep learning to tackle problems such as
image classification and text classification Book Descriptionfastai
is an easy-to-use deep learning framework built on top of PyTorch
that lets you rapidly create complete deep learning solutions with
as few as 10 lines of code. Both predominant low-level deep
learning frameworks, TensorFlow and PyTorch, require a lot of code,
even for straightforward applications. In contrast, fastai handles
the messy details for you and lets you focus on applying deep
learning to actually solve problems. The book begins by summarizing
the value of fastai and showing you how to create a simple 'hello
world' deep learning application with fastai. You'll then learn how
to use fastai for all four application areas that the framework
explicitly supports: tabular data, text data (NLP), recommender
systems, and vision data. As you advance, you'll work through a
series of practical examples that illustrate how to create
real-world applications of each type. Next, you'll learn how to
deploy fastai models, including creating a simple web application
that predicts what object is depicted in an image. The book wraps
up with an overview of the advanced features of fastai. By the end
of this fastai book, you'll be able to create your own deep
learning applications using fastai. You'll also have learned how to
use fastai to prepare raw datasets, explore datasets, train deep
learning models, and deploy trained models. What you will learn
Prepare real-world raw datasets to train fastai deep learning
models Train fastai deep learning models using text and tabular
data Create recommender systems with fastai Find out how to assess
whether fastai is a good fit for a given problem Deploy fastai deep
learning models in web applications Train fastai deep learning
models for image classification Who this book is forThis book is
for data scientists, machine learning developers, and deep learning
enthusiasts looking to explore the fastai framework using a
recipe-based approach. Working knowledge of the Python programming
language and machine learning basics is strongly recommended to get
the most out of this deep learning book.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R383
R310
Discovery Miles 3 100
Loot
Nadine Gordimer
Paperback
(2)
R383
R310
Discovery Miles 3 100
|