Dangerous Women
George R. R. Martin & Gardner Dozois
Military Applications of Natural Language Processing and Software ...
James Rodger, Parag Pendharkar, David Paper & Tamara Trank
Seeking SRE: Conversations About Running Production Systems ...
David N. Blank-Edelman
UNIX® Network Programming, Volume 1: The Sockets Networking ...
W. Richard Stevens
One Hundred Years of Russell's Paradox: Mathematics, Logic, ...
Godehard Link
Beyond Edge Computing: Swarm Computing and Ad-Hoc Edge Clouds
Ana Juan Ferrer
Artificial Intelligence for Cloud and Edge Computing
Sanjay Misra & Amit Kumar Tyagi & Vincenzo Piuri & Lalit Garg
Artificial Intelligence and Machine Learning for EDGE Computing
Rajiv Pandey & Sunil Kumar Khatri & Neeraj Kumar Singh & Parul Verma
Approximate Computing
Weiqiang Liu & Fabrizio Lombardi
Anti-Computing: Dissent and the Machine
Caroline Bassett
Analog Computing
Bernd Ulmann
Affective Computing
Rosalind W. Picard
Aesthetic Computing
Paul A. Fishwick
Advanced Computing
Michael Bader & Hans-Joachim Bungartz & Tobias Weinzierl
5G IoT and Edge Computing for Smart Healthcare
Bhoi, Akash Kumar;de Albuquerque, Victor Hugo Costa;Sur, Samarendra ...
How to Kill Website Relaunch
Pantheon
John Cage and Buddhist Ecopoetics: John Cage and the Performance ...
Peter Jaeger
John Dewey’s Philosophy of Education: An Introduction and Recontextualization ...
Jim Garrison & Stefan Neubert & Kersten Reich
Modernize your CI-CD
GitLab
Micronations and the Search for Sovereignty
Harry Hobbs & George Williams
The Encyclopedia of Leadership: A Practical Guide to Popular ...
Murray Hiebert & Bruce Klatt
Mathematical Methods for Physicists - Solutions Manual
George B. Arfken & Hans J. Weber & Frank E. Harris
Make Your Brand Matter: Experience-Driven Solutions to Capture ...
Steven G. Soechtig
Lectures to My Students
Charles H. Spurgeon
Leadership Skills
Aneeka Patel