Service Alert
Delay in delivery of Direct to Player materials
You may experience a delay in delivery of Direct to Player materials. All requests for materials will be delivered as soon as possible. Thank you for your patience.
You may experience a delay in delivery of Direct to Player materials. All requests for materials will be delivered as soon as possible. Thank you for your patience.
Showing 1 - 20 of 45567 items
By Mike Horn. 2005
In August 2002, Mike Horn set out on a mission that bordered on the impossible: to travel 12,000 miles around…
the globe at the Arctic Circle - alone, against all prevailing winds and currents, and without motorized transportation.Conquering the Impossible is the gripping account of Horn's grueling 27-month expedition by sail and by foot through extreme Arctic conditions that nearly cost him his life on numerous occasions. Enduring temperatures that ranged to as low as -95 degrees Fahrenheit, Horn battled hazards including shifting and unstable ice that gave way and plunged him into frigid waters, encounters with polar bears so close that he felt their breath on his face, severe frostbite in his fingers, and a fire that destroyed all of his equipment and nearly burned him alive.Complementing the sheer adrenaline of Horn's narrative are the isolated but touching human encounters the adventurer has with the hardy individuals who inhabit one of the remotest corners of the earth. From an Inuit who teaches him how to build an igloo to an elderly Russian left behind when the Soviets evacuated his remote Arctic town, Horn finds camaraderie, kindness, and assistance to help him survive the most unforgiving conditions.This awe-inspiring account is a page-turner and an Arctic survival tale in one. Most of all, it's a testament to one man's unrelenting desire to push the boundaries of human endurance.By Jane Maas. 2012
"Breezy and salty." -The New York Times"Hilarious! Honest, intimate, this book tells it as it was." -Mary Wells Lawrence, author…
of A Big Life (In Advertising) and founding president of Wells Rich Greene "Breezy and engaging [though] ...The chief value of Mad Women is the witness it bears for younger women about the snobbery and sexism their mothers and grandmothers endured as the price of entry into mid-century American professional life." -The Boston Globe"A real-life Peggy Olson, right out of Mad Men." -Shelly Lazarus, Chairman, Ogilvy & MatherWhat was it like to be an advertising woman on Madison Avenue in the 60s and 70s - that Mad Men era of casual sex and professional serfdom? A real-life Peggy Olson reveals it all in this immensely entertaining and bittersweet memoir.Mad Women is a tell-all account of life in the New York advertising world by Jane Maas, a copywriter who succeeded in the primarily male jungle depicted in the hit show Mad Men. Fans of the show are dying to know how accurate it is: was there really that much sex at the office? Were there really three-martini lunches? Were women really second-class citizens? Jane Maas says the answer to all three questions is unequivocally "yes." Her book, based on her own experiences and countless interviews with her peers, gives the full stories, from the junior account man whose wife almost left him when she found the copy of Screw magazine he'd used to find "a date" for a client, to the Ogilvy & Mather's annual Boat Ride, a sex-and-booze filled orgy, from which it was said no virgin ever returned intact. Wickedly funny and full of juicy inside information, Mad Women also tackles some of the tougher issues of the era, such as unequal pay, rampant, jaw-dropping sexism, and the difficult choice many women faced between motherhood and their careers.Robert Roper's Fatal Mountaineer is a gripping look at Willi Unsoeld and the epic climbs that defined him--a classic narrative…
blending action with ethics, fame with tragedy, a man's ambition with a father's anguish.In 1963, Willi Unsoeld became an international hero for his conquest of the West Ridge of Everest. A charismatic professor of philosophy, Unsoeld was one of the greatest climbers of the twentieth century, a man whose raw physical power and casual fearlessness inspired a generation of adventurers. In 1976, during an expedition to Nanda Devi, the tallest peak in India, Unsoeld's philosophy of spiritual growth through mortal risk was tragically tested. The outcome of that expedition continues to fuel one of the most fascinating debates in mountaineering history.By Christopher Heaney. 2011
In 1911, a young Peruvian boy led an American explorer and Yale historian named Hiram Bingham into the ancient Incan…
citadel of Machu Picchu. Hidden amidst the breathtaking heights of the Andes, this settlement of temples, tombs and palaces was the Incas' greatest achievement. Tall, handsome, and sure of his destiny, Bingham believed that Machu Picchu was the Incas' final refuge, where they fled the Spanish Conquistadors. Bingham made Machu Picchu famous, and his dispatches from the jungle cast him as the swashbuckling hero romanticized today as a true Indiana Jones-like character. But his excavation of the site raised old specters of conquest and plunder, and met with an indigenous nationalism that changed the course of Peruvian history. Though Bingham successfully realized his dream of bringing Machu Picchu's treasure of skulls, bones and artifacts back to the United States, conflict between Yale and Peru persists through the present day over a simple question: Who owns Inca history?In this grand, sweeping narrative, Christopher Heaney takes the reader into the heart of Peru's past to relive the dramatic story of the final years of the Incan empire, the exhilarating recovery of their final cities and the thought-provoking fight over their future. Drawing on original research in untapped archives, Heaney vividly portrays both a stunning landscape and the complex history of a fascinating region that continues to inspire awe and controversy today.By Albert Podell. 2015
This is the inspiring story of an ordinary guy who achieved two great goals that others had told him were…
impossible. First, he set a record for the longest automobile journey ever made around the world, during the course of which he blasted his way out of minefields, survived a breakdown atop the Peak of Death, came within seconds of being lynched in Pakistan, and lost three of the five men who started with him, two to disease, one to the Vietcong.After that-although it took him forty-seven more years-Albert Podell set another record by going to every country on Earth. He achieved this by surviving riots, revolutions, civil wars, trigger-happy child soldiers, voodoo priests, robbers, pickpockets, corrupt cops, and Cape buffalo. He went around, under, or through every kind of earthquake, cyclone, tsunami, volcanic eruption, snowstorm, and sandstorm that nature threw at him. He ate everything from old camel meat and rats to dung beetles and the brain of a live monkey. And he overcame attacks by crocodiles, hippos, anacondas, giant leeches, flying crabs-and several beautiful girlfriends who insisted that he stop this nonsense and marry them.Albert Podell's Around the World in 50 Years is a remarkable and meaningful tale of quiet courage, dogged persistence, undying determination, and an uncanny ability to extricate himself from one perilous situation after another-and return with some of the most memorable, frightening, and hilarious adventure stories you have ever read.By Bob Reeves. 2015
Exam Board: AQALevel: AS/A-levelSubject: Computer ScienceFirst Teaching: September 2015First Exam: June 2016This title has been approved by AQA for use…
with the AS and A-level AQA Computer Science specifications. AQA A-level Computer Science gives students the chance to think creatively and progress through the AQA AS and A-level Computer Science specifications. Detailed coverage of the specifications will enrich understanding of the fundamental principles of computing, whilst a range of activities help to develop the programming skills and computational thinking skills at A-level and beyond. - Enables students to build a thorough understanding of the fundamental principles in the AQA AS and A-Level Computer Science specifications, with detailed coverage of programming, algorithms, data structures and representation, systems, databases and networks, uses and consequences.- Helps to tackle the various demands of the course confidently, with advice and support for programming and theoretical assessments and the problem-solving or investigative project at A-level.- Develops the programming and computational thinking skills for A-level and beyond - frequent coding and question practice will help students apply their knowledge of the principles of computer science, and design, program and evaluate problem-solving computer systems. Bob Reeves is an experienced teacher with examining experience, and well-respected author of resources for Computing and ICT across the curriculum.By Klaus-Dieter Gronwald. 2024
Dieses Lehrbuch betrachtet Data Management als interdisziplinäres Konzept mit Fokus auf den Zielen datengetriebener Unternehmen. Im Zentrum steht die interaktive Entwicklung eines Unternehmensdatenmodells für ein virtuelles…
Unternehmen mit Unterstützung eines online Learning Games unter Einbeziehung der Aufgaben, Ziele und Grundsätze des Data Managements, typischer Data-Management-Komponenten und Frameworks wie Datenmodellierung und Design, Metadaten Management, Data Architecture, und Data Governance, und verknüpft diese mit datengetriebenen Anwendungen wie Business Warehousing, Big Data, In-Memory Data Management, und Machine Learning im Data Management Kontext.Das Buch dient als Lehrbuch für Studierende der Informatik, der Wirtschaft und der Wirtschaftsinformatik an Universitäten, Hochschulen und Fachschulen und zur industriellen Aus- und Weiterbildung.By Sandeep Kumar, K. Balachandran, Joong Hoon Kim, Jagdish Chand Bansal. 2024
This book is a collection of selected papers presented at the Fourth Congress on Intelligent Systems (CIS 2023), organized by…
CHRIST (Deemed to be University), Bangalore, India, under the technical sponsorship of the Soft Computing Research Society, India, during September 4–5, 2023. It includes novel and innovative work from experts, practitioners, scientists, and decision-makers from academia and industry. It covers topics such as the Internet of Things, information security, embedded systems, real-time systems, cloud computing, big data analysis, quantum computing, automation systems, bio-inspired intelligence, cognitive systems, cyber-physical systems, data analytics, data/web mining, data science, intelligence for security, intelligent decision-making systems, intelligent information processing, intelligent transportation, artificial intelligence for machine vision, imaging sensors technology, image segmentation, convolutional neural network, image/video classification, soft computing for machine vision, pattern recognition, human-computer interaction, robotic devices and systems, autonomous vehicles, intelligent control systems, human motor control, game playing, evolutionary algorithms, swarm optimization, neural network, deep learning, supervised learning, unsupervised learning, fuzzy logic, rough sets, computational optimization, and neuro-fuzzy systems.By Nur Syazreen Ahmad, Junita Mohamad-Saleh, Jiashen Teh. 2024
This book presents selected papers from the Proceedings of the International Conference 12th International Conference on Robotics, Vision, Signal Processing,…
and Power Applications ROVISP 2023, held in Penang, Malaysia, covering topic areas divided into the following tracks: (1) Robotics, Control, Mechatronics, and Automation; (2) Vision, Image and Signal Processing; (3) Telecommunication Systems and Applications; (4) Electronic Design and Applications; (5) Electrical Power, Energy, and Industrial Applications. Its content highlights state-of-the-art technologies adopted by the relevant industries which appeal to researchers and industrial practitioners working in the field.Die Digitalisierung und Entwicklungen im Gebiet der künstlichen Intelligenz haben in den letzten Jahren erhebliche Veränderungen in der Gesellschaft und…
der Unternehmenspraxis hervorgerufen. Aufkommende Technologien in den Feldern Big Data und Advanced Analytics werden auch im Controlling zunehmend diskutiert oder bereits eingesetzt. Dabei befinden sich der Wissensstand, inwieweit Big Data und Advanced Analytics das Controlling beeinflussen und verändern können, und die praktische Anwendung noch in einem frühen Stadium. Diese Arbeit befasst sich deshalb mit der Untersuchung der möglichen Auswirkungen von Big Data und Advanced Analytics im Controlling. Vor diesem Hintergrund werden die Einflüsse dieser digitalen Trends auf den Informationsversorgungsprozess des Controllings, auf die Erfüllung Controlling-spezifischer Anforderungen an Informationen und auf das Forecasting, die Budgetierung und die strategische Planung analysiert. Ferner werden praxisrelevante Herausforderungen, Grenzen und Risiken bei der Implementierung und Nutzung identifiziert sowie Implikationen zu deren Umgang zur Ausschöpfung der Potenziale abgeleitet.This book constitutes the refereed post proceedings of the Third International Scientific and Practical Conference on Information Technologies and Intelligent…
Decision Making Systems, ITIDMS 2023, held in Moscow, Russia, during December, 12-14, 2023. The 18 full papers included in this book were carefully reviewed and selected from 54 submissions. The papers presented in this volume focus on topics such as digital, intellectual and information transformation, the development of computer models and the improvement of automated and computing processes.By Guoxiang Hou, Caikan Chen, Shenglei Qin, Yuan Gao, Kai Wang. 2024
This book provides a concise and comprehensive introduction to several basic methods with more attention to their theoretical basis and…
applications in fluid dynamics. Furthermore, some new ideas are presented in this book, for example, a method to solve the transition matrix by difference operator transformation. For this method, the book gives the definition of Fourier integral transformation of translation operator, and proves the transition matrix equaling to the differential operator transformation, so that it is extended to general situations of explicit, implicit, multi-layer difference equations, etc. This flexible approach is also used in the differential part. In addition, the book also includes six types of equivalent stability definitions in two ways and deeply analyzes their errors, stabilities and convergences of the difference equations. What is more important, some new scientific contributions on lattice Boltzmann method (LBM) in recent years are presented in the book as well. The authors write the book combining their ten years teaching experience and research results and this book is intended for graduate students who are interested in the area of computational fluid dynamics (CFD). Authors list some new research achievements, such as simplified lattice Boltzmann method, the simplified lattice Boltzmann flux solver and discrete unified gas kinetic scheme, and expect that this new information could give readers possible further investigating ideas in their future research on CFD area.By Obaid Ur-Rehman, Natasa Zivic. 2024
Dieses Buch gibt einen Einblick in die Herausforderungen der Datenauthentifizierung über drahtlose Kommunikationskanäle. Die Autoren gehen davon aus, dass die…
etablierten Standard-Authentifizierungsmechanismen nicht ausreichen, um Daten wie Sprache, Bilder und Videos über drahtlose Kanäle zu authentifizieren, da die drahtlose Kommunikation durch zahlreiche Störungen gekennzeichnet ist. Die Autoren schlagen neue Mechanismen vor, die auf so genannten Soft-Authentifizierungsalgorithmen basieren, die einige Änderungen an den zu schützenden Daten tolerieren. Die Autoren erklären, dass das Ziel dieser Algorithmen darin besteht, tolerant gegenüber inhaltlichen Änderungen auf Grund von Übertragungsfehler zu sein, aber dennoch in der Lage zu sein, Fälschungen zu erkennen. Ein weiterer Vorteil der Soft-Authentifizierungsalgorithmen besteht darin, dass sie in der Lage sind, die veränderten Stellen zu identifizieren und sie nach Möglichkeit zu korrigieren. Die Autoren zeigen, wie man dies erreicht, indem man die Datenmerkmale mit Hilfe von fehlerkorrigierenden Codes schützt. · Erörtert Methoden zur Authentifizierung von Daten (insbesondere von Bildern) bei Übertragungsstörungen, die bei der drahtlosen Kommunikation auftreten; · Stellt eine neue Klasse von Soft-Authentifizierungsmethoden vor, die anstelle der üblichen Hard-Authentifizierungsmethoden verwendet werden, um geringfügige Änderungen der Bilddaten zu tolerieren; · Verfügt über Authentifizierungsmethoden, die auf der Verwendung von Authentifizierungscodes und digitalen Wasserzeichen basierenBy Tin-Chih Toly Chen, Yun-Ju Lee. 2024
This book examines smart technologies and their invaluable role in augmenting the walking experience of mobile users. From meticulously planned…
walking routes to precise footprint detection and analysis, as well as cutting-edge fall detection and prevention mechanisms, these intelligent technologies have the potential to revolutionize healthy and smart walking. Against the backdrop of the post-COVID-19 era, where unrestricted mobility has become pivotal for restoring normalcy, the demand for smart healthcare solutions has soared. The book explores latest advances in sensor technology, cloud computing, deep learning, and networking and related innovative applications that can leverage smart technologies to enhance healthy walking.By Aleksei V. Bogoviz, Alexander E. Suglobov, Alexandr N. Maloletko, Olga V. Kaurova, Svetlana V. Lobova. 2021
This book is the very first book-length study devoted to the advances in technological development and systems research in cooperative…
economics. The chapters provide, first of all, a coherent framework for understanding and applying the concepts and approaches of complexity and systems science for the advanced study of cooperative networks and particular cooperative enterprises and communities. Second, the book serves as a unique source of reliable information on the frontier information technologies available for the production, consumer, credit, and agricultural cooperative enterprises, discussing predominant strategies, potential drivers of change, and responses to complex problems. Given the diverse range of backgrounds and advanced research results, researchers, decision-makers, and stakeholders from all fields of cooperative economics in any country of the world will undoubtedly benefit from this book.If you haven't modernized your data cleaning and reporting processes in Microsoft Excel, you're missing out on big productivity gains.…
And if you're looking to conduct rigorous data analysis, more can be done in Excel than you think. This practical book serves as an introduction to the modern Excel suite of features along with other powerful tools for analytics.George Mount of Stringfest Analytics shows business analysts, data analysts, and business intelligence specialists how to make bigger gains right from your spreadsheets by using Excel's latest features. You'll learn how to build repeatable data cleaning workflows with Power Query, and design relational data models straight from your workbook with Power Pivot. You'll also explore other exciting new features for analytics, such as dynamic array functions, AI-powered insights, and Python integration.Learn how to build reports and analyses that were previously difficult or impossible to do in Excel. This book shows you how to:Build repeatable data cleaning processes for Excel with Power QueryCreate relational data models and analysis measures with Power PivotPull data quickly with dynamic arraysUse AI to uncover patterns and trends from inside ExcelIntegrate Python functionality with Excel for automated analysis and reportingBy Sarah Horton, David Sloan. 2024
Accessibility is a core quality of digital products to be deliberately addressed throughout the development lifecycle. What Every Engineer Should…
Know About Digital Accessibility will prepare readers to integrate digital accessibility into their engineering practices. Readers will learn how to accurately frame accessibility as an engineering challenge so they are able to address the correct problems in the correct way.Illustrated with diverse perspectives from accessibility practitioners and advocates, this book describes how people with disabilities use technology, the nature of accessibility barriers in the digital world, and the role of engineers in breaking down those barriers. Accessibility competence for current, emerging, and future technologies is addressed through a combination of guiding principles, core attributes and requirements, and accessibility‑informed engineering practices.FEATURES Discusses how technology can support inclusion for people with disabilities and how rigorous engineering processes help create quality user experiences without introducing accessibility barriers Explains foundational principles and guidelines that build core competency in digital accessibility as they are applied across diverse and emerging technology platforms Highlights practical insights into how engineering teams can effectively address accessibility throughout the technology development lifecycle Uses international standards to define and measure accessibility quality Written to be accessible to non‑experts in the subject area, What Every Engineer Should Know About Digital Accessibility is aimed at students, professionals, and researchers in the field of software engineering.The Internet of Things (IoT) has numerous applications, including smart cities, industries, cloud-based apps, smart homes, and surveillance.The Internet of…
Things (IoT) enables smarter living by connecting devices, people, and objects. As networking became a crucial aspect of the Internet, rigorous design analysis led to the development of new research areas.The Internet of Things has revolutionized daily living in countless ways. It enables communication between buildings, people, portable gadgets, and vehicles, facilitating mobility. Smart cities and cloud-based data have transformed corporate practices. With billions of connected gadgets, everything will soon be able to communicate remotely. IoT networks, whether public or private, rely significantly on machine learning and software-defined networking. Indian and other governments have approved various research projects on IoT-based networking technologies. This field of study will significantly impact society in the future.Researchers are concerned about the many application areas and driving forces behind smart cities. The authors aim to provide insights into software-defined networking, artificial intelligence, and machine learning technologies used in IoT and networking. The framework focuses on practical applications and infrastructures. The book includes practical challenges, case studies, innovative concepts, and other factors that impact the development of realistic scenarios for smart surveillance. It also highlights innovative technology, designs, and algorithms that can accelerate the creation of smart city concepts.This resource includes real-world applications and case studies for smart city technology, enormous data management, and machine learning prediction, all with confidentiality and safety problems.By Roderick S. Graham, 'Shawn K. Smith. 2024
Cybercrime and Digital Deviance, Second Edition, combines insights from sociology, criminology, psychology, and cybersecurity to explore cybercrimes such as hacking,…
identity theft, and romance scams, along with forms of digital deviance such as pornography addiction, trolling, and “canceling” people for perceived violations of norms.Other issues are explored including cybercrime investigations, nation-state cybercrime, the use of algorithms in policing, cybervictimization, and expanded discussion of the theories used to explain cybercrime. Graham and Smith conceptualize the online space as a distinct environment for social interaction, framing their work with assumptions informed by their respective work in urban sociology and spatial criminology, and offering an engaging entry point for understanding what may appear to be a technologically complex course of study. The authors apply a modified version of a typology developed by David Wall: cybertrespass, cyberfraud, cyberviolence, and cyberpornography. This typology is simple enough for students just beginning their inquiry into cybercrime, while its use of legal categories of trespassing, fraud, violent crimes against persons, and moral transgressions provides a solid foundation for deeper study. In this edition each chapter includes a new “Current Events and Critical Thinking” section, using concepts from the chapter to explore a specific event or topic like the effect of disinformation on social cohesion and politics.Taken together, Graham and Smith’s application of a digital environment and Wall’s cybercrime typology makes this an ideal upper-level text for students in sociology and criminal justice. It is also an ideal introductory text for students within the emerging disciplines of cybercrime and cybersecurity.Power up your Windows security skills with expert guidance, in-depth technical insights, and dozens of real-world vulnerability examples from Google…
Project Zero&’s most renowned researcher! Learn core components of the system in greater depth than ever before, and gain hands-on experience probing advanced Microsoft security systems with the added benefit of PowerShell scripts.Windows Security Internals is a must-have for anyone needing to understand the Windows operating system&’s low-level implementations, whether to discover new vulnerabilities or protect against known ones. Developers, devops, and security researchers will all find unparalleled insight into the operating system&’s key elements and weaknesses, surpassing even Microsoft&’s official documentation.Author James Forshaw teaches through meticulously crafted PowerShell examples that can be experimented with and modified, covering everything from basic resource security analysis to advanced techniques like using network authentication. The examples will help you actively test and manipulate system behaviors, learn how Windows secures files and the registry, re-create from scratch how the system grants access to a resource, learn how Windows implements authentication both locally and over a network, and much more.You&’ll also explore a wide range of topics, such as:Windows security architecture, including both the kernel and user-mode applicationsThe Windows Security Reference Monitor (SRM), including access tokens, querying and setting a resource&’s security descriptor, and access checking and auditingInteractive Windows authentication and credential storage in the Security Account Manager (SAM) and Active DirectoryMechanisms of network authentication protocols, including NTLM and KerberosIn an era of sophisticated cyberattacks on Windows networks, mastering the operating system&’s complex security mechanisms is more crucial than ever. Whether you&’re defending against the latest cyber threats or delving into the intricacies of Windows security architecture, you&’ll find Windows Security Internals indispensable in your efforts to navigate the complexities of today&’s cybersecurity landscape.