A Companion to the Philosophy of Biology
Sahotra Sarkar & Anya Plutynski
Kali Linux Hacking: A Complete Step by Step Guide to Learn the ...
Ethem Mining
Personal Identity
Raymond Martin & John Barresi
Celtic Culture: A Historical Encyclopedia
John T. Koch
The Four Loves
C. S. Lewis
Adversarial Multimedia Forensics
Ehsan Nowroozi
Advanced Techniques of Artificial Intelligence in IT Security ...
Marcin Korytkowski
Product Lifecycle Management (Volume 5): What Happens Across ...
John Stark
Embedded Machine Learning for Cyber-Physical, IoT, and Edge ...
Sudeep Pasricha & Muhammad Shafique
Fuzzy Petri Nets for Knowledge Representation, Acquisition and ...
Hua Shi & Hu-Chen Liu
The Project Management Office: Setup and Benefits
Gerhard Ortner
Language Electrified: Principles, Methods, and Future Perspectives ...
Mirko Grimaldi & Elvira Brattico & Yury Shtyrov
Blockchain Scalability
Zibin Zheng & Wuhui Chen & Huawei Huang
Security and Risk Analysis for Intelligent Edge Computing
Gautam Srivastava & Uttam Ghosh & Jerry Chun-Wei Lin
Social Edge Computing: Empowering Human-Centric Edge Computing, ...
Dong Wang & Daniel 'Yue' Zhang
Applications of Computational Intelligence in Management & Mathematics: ...
Madhusudhan Mishra & Nishtha Kesswani & Imene Brigui
Higher Education Computer Science: A Manual of Practical Approaches
Jenny Carter & Michael O'Grady & Clive Rosen
Data Science for Entrepreneurship: Principles and Methods for ...
Werner Liebregts & Willem-Jan van Den Heuvel & Arjan van Den Born
Beyond Edge Computing: Swarm Computing and Ad-Hoc Edge Clouds
Ana Juan Ferrer
Knowledge-Based Software Engineering: 2022: Proceedings of the ...
Maria Virvou & Takuya Saruwatari & Lakhmi C. Jain
Handbook of Neurotoxicity
Richard M. Kostrzewa
Modern Methods in Mathematical Physics: Integral Equations in ...
Vladimir Ryzhov & Tatiana Fedorova & Kirill Safronov & Shaharin Anwar Sulaiman & Samsul Ariffin Abdul Karim
Text Mining for Information Professionals - An Uncharted Territory
Manika Lamba & Margam Madhusudhan