Bad Arguments: 100 of the Most Important Fallacies in Western ...
Robert Arp & Michael Bruce & Steven Barbone
The Book of Evidence
Peter Achinstein
In-Visibility: Reflections Upon Visibility and Transcendence ...
Anna Vind & Iben Damgaard & Kirsten Busch Nielsen & Sven Rune Havsteen & Christopher B. Brown & Günter Frank & Bruce Gordon & Barbara Mahlmann-Bauer & Tarald Rasmussen & Violet Soen & Zsombor Tóth & Günther Wassilowsky & Siegrid Westphal
The Philosophy of Enchantment: Studies in Folktale, Cultural ...
Robin George Collingwood & David Boucher & Wendy James & Philip Smallwood
Manifesto for Philosophy
Alain Badiou
Linux System Administration Recipes: A Problem-Solution Approach
Juliet Kemp
Natural Language Processing and Information Systems: 12th International ...
Zoubida Kedad & Nadira Lammari & Elisabeth Métais & Farid Meziane & Yacine Rezgui
Windows Assembly Language and Systems Programming: 16- and 32-Bit ...
Barry Kauler
Augmented Reality and Virtual Reality: Empowering Human, Place ...
Timothy Jung & M. Claudia Tom Dieck
Software Testing: A Craftsman’s Approach, Fourth Edition
Paul C. Jorgensen
Accelerating Process Improvement Using Agile Techniques
Deb Jacobs
Mobile Computing
Tomasz Imielinski & Henry F. Korth
Spoken Language Processing: A Guide to Theory, Algorithm, and ...
Xuedong Huang & Alejandro Acero & Alex Acero & Hsiao-Wuen Hon
High-Performance Computing Applications in Numerical Simulation ...
Changjun Hu & Wen Yang & Congfeng Jiang & Dong Dai
Natural Language Processing and Information Systems: 14th International ...
Helmut Horacek & Elisabeth Metais & Rafael Munoz & Magdalena Wolska
The Complete Project Management Office Handbook
Gerard M. Hill
The Complete Project Management Office Handbook, Second Edition
Ontology Management: Semantic Web, Semantic Web Services, and ...
Martin Hepp & Pieter de Leenheer & Aldo de Moor & York Sure
A Practical Guide to Content Delivery Networks
Gilbert Held
A Practical Guide to Content Delivery Networks, Second Edition
IoT Fundamentals: Networking Technologies, Protocols, and Use ...
David Hanes & Gonzalo Salgueiro & Patrick Grossetete & Robert Barton & Jerome Henry
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies ...
Morey J. Haber & Brian Chappell & Christopher Hills
Fog, Edge, and Pervasive Computing in Intelligent IoT Driven ...
Deepak Gupta & Aditya Khamparia