You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Joel Spring’s American Education introduces readers to the historical, political, social, and legal foundations of education and to the profession of teaching in the United States. In his signature straightforward and concise approach to describing complex issues, Spring illuminates events and topics and that are often overlooked or whitewashed, giving students the opportunity to engage in critical thinking about education. In this edition he looks closely at the global context of education in the U.S. Featuring current information and challenging perspectives—with scholarship that is often cited as a primary source, students will come away from this clear, authoritative text informed on...
This book contains practical ideas on making the most out of every space in the home. Among the ideas included are tips to make spaces look larger; advice on lighting; a guide to storage in the kitchen, bathrooms and areas throughout the home; recommendations for entrance areas and hallways; examples of how to hang pictures; and suggestions for indoor and outdoor furniture, all following interior design principles and presented in a fun and instructive way. The images by photographer Jose Luis Hausmann offer a look inside a careful selection of homes of very different types and styles. The photos themselves offer a valuable source of inspiration that will last beyond current fashions and styles.
Software plays a critical role in today’s global information economy. It runs the computers, networks, and devices that enable countless products and services. Software varies in size from vast enterprise and communications systems like the enormous enterprise resource planning system from SAP to the tiny app Angry Birds. This book offers a profile of the software industry and the companies in the industry. It describes the primary products and services produced; reviews its history; explains how the industry is structured; discusses its economics and competitive environment; and examines important trends and issues including globalization, workforce, regulation, and the emergence of new software business models. Software runs the computers and networks that support the flow of information in the global economy, and this book provides a real look at the intricacies of this industry.
A Lifetime of Fiction: The 500 Most Recommended Reads for Ages 2 to 102 is the most authoritative set of fiction book recommendations in the United States because it is a composite of the most noteworthy book award lists, best book publications, and recommended reading lists from leading libraries, schools, and parenting organizations from across the country. Who are these formidable experts? A Lifetime of Fiction amalgamates over 100 reading lists, including Time Magazine’s Top 100 Novels, Modern Library’s 100 Best Novels, Horn Book Children’s Classics, The New York Times Parent’s Guide to the Best Books for Children, Harvard Bookstore Favorite Books, College Board’s Great Books R...
There is intense competition among emerging markets to capture their share of the global economy. This book addresses questions that are germane to accomplishing this goal. Most important to this end is the study and practice of international business and foreign trade.
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of modern cryptography, with a focus on formal definitions, precise assumptions, and rigorous proofs. The authors introduce the core principles of modern cryptography, including the modern, computational approach to security that overcomes the limitations of perfect secrecy. An extensive treatment of private-key encryption and message authentication follows. The authors also illustrate design principles for block ciphers, such as the Data Encryption Standard (DES) and the Advanced Encryption Standar...
This textbook discusses engineering principles relating to air pollution and greenhouse gases (GHGs); it focuses on engineering principles and designs of related devices and equipment for air emission control for a variety of industries such as energy, chemical, and transportation industries. The book aims primarily at senior undergraduate and graduate students in mechanical, chemical and/or environmental engineering departments; it can also be used as a reference book by technical staff and design engineers who are interested in and need to have technical knowledge in air pollution and GHGs. The book is motivated by recent rapid advances in air pollution and greenhouse gas emissions and the...
Haykin examines both the mathematical theory behind various linear adaptive filters with finite-duration impulse response (FIR) and the elements of supervised neural networks. This edition has been updated and refined to keep current with the field and develop concepts in as unified and accessible a manner as possible. It: introduces a completely new chapter on Frequency-Domain Adaptive Filters; adds a chapter on Tracking Time-Varying Systems; adds two chapters on Neural Networks; enhances material on RLS algorithms; strengthens linkages to Kalman filter theory to gain a more unified treatment of the standard, square-root and order-recursive forms; and includes new computer experiments using MATLAB software that illustrate the underlying theory and applications of the LMS and RLS algorithms.
This book presents a collection of state-of-the-art AI approaches to cybersecurity and cyberthreat intelligence, offering strategic defense mechanisms for malware, addressing cybercrime, and assessing vulnerabilities to yield proactive rather than reactive countermeasures. The current variety and scope of cybersecurity threats far exceed the capabilities of even the most skilled security professionals. In addition, analyzing yesterday’s security incidents no longer enables experts to predict and prevent tomorrow’s attacks, which necessitates approaches that go far beyond identifying known threats. Nevertheless, there are promising avenues: complex behavior matching can isolate threats based on the actions taken, while machine learning can help detect anomalies, prevent malware infections, discover signs of illicit activities, and protect assets from hackers. In turn, knowledge representation enables automated reasoning over network data, helping achieve cybersituational awareness. Bringing together contributions by high-caliber experts, this book suggests new research directions in this critical and rapidly growing field.