|
Showing 1 - 25 of
131 matches in All Departments
Unlike some other reproductions of classic texts (1) We have not
used OCR(Optical Character Recognition), as this leads to bad
quality books with introduced typos. (2) In books where there are
images such as portraits, maps, sketches etc We have endeavoured to
keep the quality of these images, so they represent accurately the
original artefact. Although occasionally there may be certain
imperfections with these old texts, we feel they deserve to be made
available for future generations to enjoy.
Publisher's Note: Products purchased from Third Party sellers are
not guaranteed by the publisher for quality, authenticity, or
access to any online entitlements included with the product.
Complete coverage of the basis of cancer and molecular biology -
from globally recognized experts The Basic Science of Oncology is
an accessible and thorough introduction to cancer causation, cancer
biology, and the biology underlying cancer treatment. You'll find
everything you need to know about the latest critical thinking in
oncology, as well ready to apply information about state-of-the-art
science and therapeutic applications. Written by leading oncology
researchers and clinicians, this is an essential resource for
health professionals, students, advanced undergraduates and
graduates in biological sciences, and clinicians needing an
understanding of cancer cells. Presented in full-color, The Basic
Science of Oncology reflects the latest research and developments
in the field. Features NEW chapters: Epigenetics and Principles of
Genome Regulation and Targeted Cancer Diagnosis and Treatment
Thoroughly revised content, with expanded coverage of key topics
such as immune system and immunotherapy, tumor growth and
metabolism, vaccine development, methods of molecular analysis,
tumor environment, and more The most current, evidence-based
oncology primer-one that encapsulates the science of cancer
causation, cancer biology, and cancer therapy Key insights into
molecular and genetic aspects of cancer familiarize you with cancer
biology as applied to prognosis and personalized cancer medicine
In-depth focus on the discovery, evaluation, and biology of
anti-cancer drugs, immunotherapy, and molecularly-targeted agents
Up-to-date coverage of the basic science of radiation therapy
A dictionary containing over 1900 biographical notices of Sudanese
and foreign persons who died before 1948.
This title was first published in 2003. Donald Cardwell's interest
in the inter-relationships between science, technology, education
and society are exemplified in the selection of his studies and
essays brought together here. The first section deals with the rise
of scientific education in Britain, comparing it with that on the
Continent. The next studies explore the development of the
scientific understanding of power, especially steam power, and its
application in the new technologies of the Industrial Revolution.
The final section looks at learned societies, and in particular at
Manchester, making explicit a theme running through many of the
articles - the reasons why science, society and education came
together to make this city what he called 'the centre of the
industrial revolution'.
Comprehensive, contemporary, and engaging, Animal Physiology
provides evolutionary and ecological context to help students make
connections across all levels of physiological scale. One of the
major challenges instructors and students face in Animal Physiology
is making connections across levels of biological scale. Animal
Physiology addresses this challenge by providing ecological and
evolutionary context to the study of physiology at all levels of
organization: genome, molecular biology, biochemistry, cells,
tissues, organs, and organ systems. Hill's inclusion of ecology and
evolution helps readers gain a holistic perspective on animal
function and sets Animal Physiology apart from texts that focus
more narrowly on physiology. Hill's Animal Physiology is trusted by
instructors and students because of its authoritative, current,
engaging, and lavishly illustrated presentation.
This title was first published in 2003. Donald Cardwell's interest
in the inter-relationships between science, technology, education
and society are exemplified in the selection of his studies and
essays brought together here. The first section deals with the rise
of scientific education in Britain, comparing it with that on the
Continent. The next studies explore the development of the
scientific understanding of power, especially steam power, and its
application in the new technologies of the Industrial Revolution.
The final section looks at learned societies, and in particular at
Manchester, making explicit a theme running through many of the
articles - the reasons why science, society and education came
together to make this city what he called 'the centre of the
industrial revolution'.
The indie game developer's complete guide to running a studio. The
climate for the games industry has never been hotter, and this is
only set to continue as the marketplace for tablets, consoles and
phones grow. Seemingly every day there is a story of how a
successful app or game has earned thousands of downloads and
revenue. As the market size increases, so does the number of people
developing and looking to develop their own app or game to publish.
The Indie Game Developer Handbook covers every aspect of running a
game development studio from the initial creation of the game
through to completion, release and beyond. Accessible and complete
guide to many aspects of running a game development studio from
funding and development through QA, publishing, marketing, and
more. Provides a useful knowledge base and help to support the
learning process of running an indie development studio in an
honest, approachable and easy to understand way. Case studies,
interviews from other studies and industry professionals grant an
first-hand look into the world of indie game development
The indie game developer's complete guide to running a studio. The
climate for the games industry has never been hotter, and this is
only set to continue as the marketplace for tablets, consoles and
phones grow. Seemingly every day there is a story of how a
successful app or game has earned thousands of downloads and
revenue. As the market size increases, so does the number of people
developing and looking to develop their own app or game to publish.
The Indie Game Developer Handbook covers every aspect of running a
game development studio-from the initial creation of the game
through to completion, release and beyond. Accessible and complete
guide to many aspects of running a game development studio from
funding and development through QA, publishing, marketing, and
more. Provides a useful knowledge base and help to support the
learning process of running an indie development studio in an
honest, approachable and easy to understand way. Case studies,
interviews from other studies and industry professionals grant an
first-hand look into the world of indie game development
A dictionary containing over 1900 biographical notices of Sudanese
and foreign persons who died before 1948.
The twenty-first-century psychotherapist can no longer be
constrained by specific schools of practice or limited reservoirs
of knowledge. But this new "era of information" needs to be
integrated and made manageable for every practitioner. This book
helps therapists learn more about this new knowledge and how to
apply it effectively. In this single-volume learning resource,
Richard Hill and Matthew Dahlitz introduce practitioners to the
many elements that create our psychology. From basic neuroscience
to body-brain systems and genetic processes, therapists will
discover how to become more "response-able" to their clients.
Topics include neurobiology, genetics, key therapeutic practices to
treat anxiety, depression, trauma and other disorders; memory;
mirror neurons and empathy, and more. All are presented with case
studies and treatment applications.
This book provides a valuable reference for digital forensics
practitioners and cyber security experts operating in various
fields of law enforcement, incident response and commerce. It is
also aimed at researchers seeking to obtain a more profound
knowledge of Digital Forensics and Cybercrime. Furthermore, the
book is an exceptional advanced text for PhD and Master degree
programmes in Digital Forensics and Cyber Security. Each chapter of
this book is written by an internationally-renowned expert who has
extensive experience in law enforcement, industry and academia. The
increasing popularity in the use of IoT devices for criminal
activities means that there is a maturing discipline and industry
around IoT forensics. As technology becomes cheaper and easier to
deploy in an increased number of discrete, everyday objects, scope
for the automated creation of personalised digital footprints
becomes greater. Devices which are presently included within the
Internet of Things (IoT) umbrella have a massive potential to
enable and shape the way that humans interact and achieve
objectives. These also forge a trail of data that can be used to
triangulate and identify individuals and their actions. As such,
interest and developments in autonomous vehicles, unmanned drones
and 'smart' home appliances are creating unprecedented
opportunities for the research communities to investigate the
production and evaluation of evidence through the discipline of
digital forensics.
This textbook describes the hands-on application of data science
techniques to solve problems in manufacturing and the Industrial
Internet of Things (IIoT). Monitoring and managing operational
performance is a crucial activity for industrial and business
organisations. The emergence of low-cost, accessible computing and
storage, through Industrial Digital Technologies (IDT) and Industry
4.0, has generated considerable interest in innovative approaches
to doing more with data. Data science, predictive analytics,
machine learning, artificial intelligence and general approaches to
modelling, simulating and visualising industrial systems have often
been considered topics only for research labs and academic
departments. This textbook debunks the mystique around applied data
science and shows readers, using tutorial-style explanations and
real-life case studies, how practitioners can develop their own
understanding of performance to achieve tangible business
improvements. All exercises can be completed with commonly
available tools, many of which are free to install and use. Readers
will learn how to use tools to investigate, diagnose, propose and
implement analytics solutions that will provide explainable results
to deliver digital transformation.
Artist Kent Monkman's all-encompassing project, Shame and
Prejudice: A Story of Resilience, takes viewers on a journey
through Canada's history, starting in the present and going back to
before Canadian confederation. Throughout the book there are
clever, albeit controversial, commentaries told by Monkman's
genderfluid, time-travelling, supernatural alter-ego Miss Chief
Eagle Testickle. Her narratives take viewers through the history of
New France and the fur trade, the nineteenth-century dispossession
of First Nations lands through Canadian colonial policies, the
horrors of the residential school system, and modern First Nations
experiences in urban environments. Shame and Prejudice challenges
predominant narratives of Canadian history and honours the
resilience of First Nations peoples. This book accompanies
Monkman's largest solo exhibition to date, which is currently
travelling across Canada at venues including the Art Museum at the
University of Toronto, the Winnipeg Art Gallery, the Glenbow Museum
in Calgary, and the Museum of Anthropology in Vancouver. The
exhibition includes the artist's own paintings, drawings, and
sculptural works, which form a dialogue with historical artefacts
and artworks borrowed from museums and private collections across
Canada. The book is trilingual with all text in English, French and
Cree.
This book provides a valuable reference for digital forensics
practitioners and cyber security experts operating in various
fields of law enforcement, incident response and commerce. It is
also aimed at researchers seeking to obtain a more profound
knowledge of Digital Forensics and Cybercrime. Furthermore, the
book is an exceptional advanced text for PhD and Master degree
programmes in Digital Forensics and Cyber Security. Each chapter of
this book is written by an internationally-renowned expert who has
extensive experience in law enforcement, industry and academia. The
increasing popularity in the use of IoT devices for criminal
activities means that there is a maturing discipline and industry
around IoT forensics. As technology becomes cheaper and easier to
deploy in an increased number of discrete, everyday objects, scope
for the automated creation of personalised digital footprints
becomes greater. Devices which are presently included within the
Internet of Things (IoT) umbrella have a massive potential to
enable and shape the way that humans interact and achieve
objectives. These also forge a trail of data that can be used to
triangulate and identify individuals and their actions. As such,
interest and developments in autonomous vehicles, unmanned drones
and 'smart' home appliances are creating unprecedented
opportunities for the research communities to investigate the
production and evaluation of evidence through the discipline of
digital forensics.
This professional guide and reference examines the challenges of
assessing security vulnerabilities in computing infrastructure.
Various aspects of vulnerability assessment are covered in detail,
including recent advancements in reducing the requirement for
expert knowledge through novel applications of artificial
intelligence. The work also offers a series of case studies on how
to develop and perform vulnerability assessment techniques using
start-of-the-art intelligent mechanisms. Topics and features:
provides tutorial activities and thought-provoking questions in
each chapter, together with numerous case studies; introduces the
fundamentals of vulnerability assessment, and reviews the state of
the art of research in this area; discusses vulnerability
assessment frameworks, including frameworks for industrial control
and cloud systems; examines a range of applications that make use
of artificial intelligence to enhance the vulnerability assessment
processes; presents visualisation techniques that can be used to
assist the vulnerability assessment process. In addition to serving
the needs of security practitioners and researchers, this
accessible volume is also ideal for students and instructors
seeking a primer on artificial intelligence for vulnerability
assessment, or a supplementary text for courses on computer
security, networking, and artificial intelligence.
This professional guide and reference examines the challenges of
assessing security vulnerabilities in computing infrastructure.
Various aspects of vulnerability assessment are covered in detail,
including recent advancements in reducing the requirement for
expert knowledge through novel applications of artificial
intelligence. The work also offers a series of case studies on how
to develop and perform vulnerability assessment techniques using
start-of-the-art intelligent mechanisms. Topics and features:
provides tutorial activities and thought-provoking questions in
each chapter, together with numerous case studies; introduces the
fundamentals of vulnerability assessment, and reviews the state of
the art of research in this area; discusses vulnerability
assessment frameworks, including frameworks for industrial control
and cloud systems; examines a range of applications that make use
of artificial intelligence to enhance the vulnerability assessment
processes; presents visualisation techniques that can be used to
assist the vulnerability assessment process. In addition to serving
the needs of security practitioners and researchers, this
accessible volume is also ideal for students and instructors
seeking a primer on artificial intelligence for vulnerability
assessment, or a supplementary text for courses on computer
security, networking, and artificial intelligence.
This book reviews the theoretical concepts, leading-edge techniques
and practical tools involved in the latest multi-disciplinary
approaches addressing the challenges of big data. Illuminating
perspectives from both academia and industry are presented by an
international selection of experts in big data science. Topics and
features: describes the innovative advances in theoretical aspects
of big data, predictive analytics and cloud-based architectures;
examines the applications and implementations that utilize big data
in cloud architectures; surveys the state of the art in
architectural approaches to the provision of cloud-based big data
analytics functions; identifies potential research directions and
technologies to facilitate the realization of emerging business
models through big data approaches; provides relevant theoretical
frameworks, empirical research findings, and numerous case studies;
discusses real-world applications of algorithms and techniques to
address the challenges of big datasets.
This book reviews the theoretical concepts, leading-edge techniques
and practical tools involved in the latest multi-disciplinary
approaches addressing the challenges of big data. Illuminating
perspectives from both academia and industry are presented by an
international selection of experts in big data science. Topics and
features: describes the innovative advances in theoretical aspects
of big data, predictive analytics and cloud-based architectures;
examines the applications and implementations that utilize big data
in cloud architectures; surveys the state of the art in
architectural approaches to the provision of cloud-based big data
analytics functions; identifies potential research directions and
technologies to facilitate the realization of emerging business
models through big data approaches; provides relevant theoretical
frameworks, empirical research findings, and numerous case studies;
discusses real-world applications of algorithms and techniques to
address the challenges of big datasets.
Over the past two decades, we have witnessed unprecedented
innovations in the development of miniaturized electromechanical
devices and low-power wireless communication making practical the
embedding of networked computational devices into a rapidly
widening range of material entities. This trend has enabled the
coupling of physical objects and digital information into
cyber-physical systems and it is widely expected to revolutionize
the way resource computational consumption and provision will
occur. Specifically, one of the core ingredients of this vision,
the so-called Internet of Things (IoT), demands the provision of
networked services to support interaction between conventional IT
systems with both physical and artificial objects. In this way, IoT
is seen as a combination of several emerging technologies, which
enables the transformation of everyday objects into smart objects.
It is also perceived as a paradigm that connects real world with
digital world. The focus of this book is exactly on the novel
collective and computational intelligence technologies that will be
required to achieve this goal. While, one of the aims of this book
is to discuss the progress made, it also prompts future directions
on the utilization of inter-operable and cooperative next
generation computational technologies, which supports the IoT
approach, that being an advanced functioning towards an integrated
collective intelligence approach for the benefit of various
organizational settings.
This book describes the landscape of cloud computing from first
principles, leading the reader step-by-step through the process of
building and configuring a cloud environment. The book not only
considers the technologies for designing and creating cloud
computing platforms, but also the business models and frameworks in
real-world implementation of cloud platforms. Emphasis is placed on
"learning by doing," and readers are encouraged to experiment with
a range of different tools and approaches. Topics and features:
includes review questions, hands-on exercises, study activities and
discussion topics throughout the text; demonstrates the approaches
used to build cloud computing infrastructures; reviews the social,
economic, and political aspects of the on-going growth in cloud
computing use; discusses legal and security concerns in cloud
computing; examines techniques for the appraisal of financial
investment into cloud computing; identifies areas for further
research within this rapidly-moving field.
This important text provides a single point of reference for
state-of-the-art cloud computing design and implementation
techniques. The book examines cloud computing from the perspective
of enterprise architecture, asking the question; how do we realize
new business potential with our existing enterprises? Topics and
features: with a Foreword by Thomas Erl; contains contributions
from an international selection of preeminent experts; presents the
state-of-the-art in enterprise architecture approaches with respect
to cloud computing models, frameworks, technologies, and
applications; discusses potential research directions, and
technologies to facilitate the realization of emerging business
models through enterprise architecture approaches; provides
relevant theoretical frameworks, and the latest empirical research
findings.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|