Free Delivery Over $100
88570 books were found.
These chapters are authored by esteemed professors and researchers in the field of reliability engineering, and... Read More >>
Complex systems seem to magically emerge from the interactions of their parts. “Physics Fixes All the Facts” ends... Read More >>
Read More >>
The Bandwidth Protocol is not a self-help book. It does not persuade, motivate, or console. It registers what persists... Read More >>
This book features high-quality research papers presented at Sixth Doctoral Symposium on Computational Intelligence... Read More >>
This book offers a multifaceted exploration of cybersecurity through the lenses of policy, ethics, and advanced... Read More >>
This updated Second Edition of Research Methods for Education transforms complex research concepts into an accessible,... Read More >>
Proactive risk management transforms home service businesses by identifying and mitigating potential threats, fostering... Read More >>
In When Seconds Count, researcher and insurance professional Bunmi Ogunwusi presents a groundbreaking framework... Read More >>
A mysterious guide. A hidden protocol. A descent into the digital unknown. Welcome to the journey. The DarkWhale... Read More >>
The content discussed is beneficial in the broad application of multisensor fusion, as the algorithms developed... Read More >>
Do you have more freedom than ever - yet feel mentally exhausted? Do you delay decisions you care about, even when... Read More >>
This book delves into the dynamic intersection of optimization and discrete mathematics, offering a comprehensive... Read More >>
This book investigates technologies that enable more powerful resources and improve resource utilization for end-edge-cloud... Read More >>
A guide to mutually transformative collaboration between artists and scientists. Art-Science Undisciplined invites... Read More >>
How we identify, assess and exercise judgement in decisions big and small - and how to do it better Read More >>
This book discusses the design and evaluation of Physically Unclonable Functions (PUFs) that are suitable for securing... Read More >>