You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Looking for America: The Visual Production of Nation andPeople is a groundbreaking collection that explores the“visual” in defining the kaleidoscope of Americanexperience and American identity in the 20th century. Covers enduringly important topics in American history:nationhood, class, politics of identity, and the visual mapping of“others” Includes editorial introductions, suggested readings, a primeron how to "read" an image, and a guide to visual archives andcollections Well-illustrated book for those in American Studies and relatedfields eager to incorporate the visual into theirteaching—and telling—of the American story.
Seventh grader Derrick's "Dead Max Comix" are such a hit in the school paper that he and Max start an advice column. Derrick and Doug should have asked for advice before they started a band without inviting Kim and Keisha to join. To get even, Kim challenges the guys to come up with awesome costumes for Comic-Con and enter the upcoming Battle of the Bands. Will the Battle of the Bands mean the end of Derrick and Kim? More importantly, who will win?
None
The Three Kingdoms is a tumultuous period in Chinese history when warlords battled one another to rule all under the heavens. Many Chinese fables and legends were made during this time, revealing the complex, multi-dimensional characteristics of the Chinese race. There are as many modern versions of the Three Kingdoms as there are ancient texts. However, those which are easy to read or watch on screen are often lacking in depth and detail. Others are meaningful but fiendishly difficult to read. Much more than just a translation, this book is written in modern English, balancing depth with easy reading. For those new to the Three Kingdoms, it offers an introduction with just the right dose of detail. For those already familiar with the Three Kingdoms, it may offer a deeper understanding or sense of realism on this epic saga.
The Comprehensive, Proven Approach to IT Scalability–Updated with New Strategies, Technologies, and Case Studies In The Art of Scalability, Second Edition, leading scalability consultants Martin L. Abbott and Michael T. Fisher cover everything you need to know to smoothly scale products and services for any requirement. This extensively revised edition reflects new technologies, strategies, and lessons, as well as new case studies from the authors’ pioneering consulting practice, AKF Partners. Writing for technical and nontechnical decision-makers, Abbott and Fisher cover everything that impacts scalability, including architecture, process, people, organization, and technology. Their ins...
None
"The Struggles of an Ordinary Man - The Turbulent History of China Through a Farmer's Eyes from 1900 to 2000 (Volume Two)" is the true record of one hundred years of modern history in rural areas of the Eastern Shandong Peninsula from the 1900 to 2000, including the end of the Qing Dynasty, the Anti-Japanese War (1938-1945), China's War of Liberation (1945-1949), the development of China after liberation (1950-1957), the Great Leap Forward Movement (1958-1959), the Three-year Disaster (1960-1962), the Socialist Education Movement (1964-1965), the Great Cultural Revolution (1966-1976), and the reform and opening up of China (1978-2000). This work, with the spirit of unvarnished realism and true-life style, illustrates the actual life and inner mind of an ordinary man in rural areas, and through his eyes to see the significant changes of China during the past one hundred years.
The two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005, held in Xi'an, China, in December 2005. The 338 revised papers presented - 254 regular and 84 extended papers - were carefully reviewed and selected from over 1800 submissions. The first volume is organized in topical sections on learning and fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, pattern recognition, and applications. The second volume is subdivided in topical sections on cryptography and coding, cryptographic protocols, intrusion detection, security models and architecture, security management, watermarking and information hiding, web and network applications, image and signal processing, and applications.