Service Alert
Delay in delivery of Direct to Player materials
You may experience a delay in delivery of Direct to Player materials. All requests for materials will be delivered as soon as possible. Thank you for your patience.
You may experience a delay in delivery of Direct to Player materials. All requests for materials will be delivered as soon as possible. Thank you for your patience.
Showing 1 - 20 of 51759 items
By Jane Maas. 2012
"Breezy and salty." -The New York Times"Hilarious! Honest, intimate, this book tells it as it was." -Mary Wells Lawrence, author…
of A Big Life (In Advertising) and founding president of Wells Rich Greene "Breezy and engaging [though] ...The chief value of Mad Women is the witness it bears for younger women about the snobbery and sexism their mothers and grandmothers endured as the price of entry into mid-century American professional life." -The Boston Globe"A real-life Peggy Olson, right out of Mad Men." -Shelly Lazarus, Chairman, Ogilvy & MatherWhat was it like to be an advertising woman on Madison Avenue in the 60s and 70s - that Mad Men era of casual sex and professional serfdom? A real-life Peggy Olson reveals it all in this immensely entertaining and bittersweet memoir.Mad Women is a tell-all account of life in the New York advertising world by Jane Maas, a copywriter who succeeded in the primarily male jungle depicted in the hit show Mad Men. Fans of the show are dying to know how accurate it is: was there really that much sex at the office? Were there really three-martini lunches? Were women really second-class citizens? Jane Maas says the answer to all three questions is unequivocally "yes." Her book, based on her own experiences and countless interviews with her peers, gives the full stories, from the junior account man whose wife almost left him when she found the copy of Screw magazine he'd used to find "a date" for a client, to the Ogilvy & Mather's annual Boat Ride, a sex-and-booze filled orgy, from which it was said no virgin ever returned intact. Wickedly funny and full of juicy inside information, Mad Women also tackles some of the tougher issues of the era, such as unequal pay, rampant, jaw-dropping sexism, and the difficult choice many women faced between motherhood and their careers.By Con Coughlin. 2013
Churchill's First War by Con Coughlin is a fascinating account of Winston Churchill's early military career fighting in the 1890…
Afghan campaign, offering fresh and revealing parallels into today's war in AfghanistanJust over a century ago British troops were fighting a vicious frontier war against Pashtun tribeman on the North West Frontier—the great-great-grandfathers of the Taliban and tribal insurgents in modern-day Afghanistan. Winston Churchill, then a young cavalry lieutenant, wrote a vivid account of what he saw during his first major campaign. The Story of the Malakand Field Force, published in 1898, was Churchill's first book and, a hundred years later, is required reading for military commanders on the ground, both British and American.In Churchill's First War, acclaimed author and foreign correspondent, Con Coughlin tells the story of that campaign, a story of high adventure and imperial success, which contains many lessons and warnings for today. Combining historical narrative, interviews with contemporary key players, and the journalist's eye for great color and analysis, Churchill's First War affords us a rare insight into both the nineteenth-century "Great Game" and the twenty-first-century conflict that has raged longer than World War II.In a narrative both panoramic and intimate, Tom Chaffin captures the four-decade friendship of Thomas Jefferson and the Marquis de…
Lafayette.Thomas Jefferson and the Marquis de Lafayette shared a singularly extraordinary friendship, one involved in the making of two revolutions—and two nations. Jefferson first met Lafayette in 1781, when the young French-born general was dispatched to Virginia to assist Jefferson, then the state’s governor, in fighting off the British. The charismatic Lafayette, hungry for glory, could not have seemed more different from Jefferson, the reserved statesman. But when Jefferson, a newly-appointed diplomat, moved to Paris three years later, speaking little French and in need of a partner, their friendship began in earnest. As Lafayette opened doors in Paris and Versailles for Jefferson, so too did the Virginian stand by Lafayette as the Frenchman became inexorably drawn into the maelstrom of his country's revolution. Jefferson counseled Lafayette as he drafted TheDeclaration of the Rights of Man and remained a firm supporter of the French Revolution, even after he returned to America in 1789. By 1792, however, the upheaval had rendered Lafayette a man without a country, locked away in a succession of Austrian and Prussian prisons. The burden fell on Jefferson, along with Lafayette's other friends, to win his release. The two would not see each other again until 1824, in a powerful and emotional reunion at Jefferson’s Monticello. Steeped in primary sources, Revolutionary Brothers casts fresh light on this remarkable, often complicated, friendship of two extraordinary men.By Audie Murphy. 1949
The classic bestselling war memoir by the most decorated American soldier in World War II. Originally published in 1949, To…
Hell and Back was a smash bestseller for fourteen weeks and later became a major motion picture starring Audie Murphy as himself. Many decades later, this classic wartime memoir is just as gripping as it was then. Desperate to see action but rejected by both the marines and paratroopers because he was too short, Murphy eventually found a home with the infantry. He fought through campaigns in Sicily, Italy, France, and Germany. Although still under twenty-one years old on V-E Day, he was credited with having killed, captured, or wounded 240 Germans. He emerged from the war as America's most decorated soldier, having received twenty-one medals, including our highest military decoration, the Congressional Medal of Honor. To Hell and Back is a powerfully real portrayal of American GI's at war.By Bob Reeves. 2015
Exam Board: AQALevel: AS/A-levelSubject: Computer ScienceFirst Teaching: September 2015First Exam: June 2016This title has been approved by AQA for use…
with the AS and A-level AQA Computer Science specifications. AQA A-level Computer Science gives students the chance to think creatively and progress through the AQA AS and A-level Computer Science specifications. Detailed coverage of the specifications will enrich understanding of the fundamental principles of computing, whilst a range of activities help to develop the programming skills and computational thinking skills at A-level and beyond. - Enables students to build a thorough understanding of the fundamental principles in the AQA AS and A-Level Computer Science specifications, with detailed coverage of programming, algorithms, data structures and representation, systems, databases and networks, uses and consequences.- Helps to tackle the various demands of the course confidently, with advice and support for programming and theoretical assessments and the problem-solving or investigative project at A-level.- Develops the programming and computational thinking skills for A-level and beyond - frequent coding and question practice will help students apply their knowledge of the principles of computer science, and design, program and evaluate problem-solving computer systems. Bob Reeves is an experienced teacher with examining experience, and well-respected author of resources for Computing and ICT across the curriculum.By Klaus-Dieter Gronwald. 2024
Dieses Lehrbuch betrachtet Data Management als interdisziplinäres Konzept mit Fokus auf den Zielen datengetriebener Unternehmen. Im Zentrum steht die interaktive Entwicklung eines Unternehmensdatenmodells für ein virtuelles…
Unternehmen mit Unterstützung eines online Learning Games unter Einbeziehung der Aufgaben, Ziele und Grundsätze des Data Managements, typischer Data-Management-Komponenten und Frameworks wie Datenmodellierung und Design, Metadaten Management, Data Architecture, und Data Governance, und verknüpft diese mit datengetriebenen Anwendungen wie Business Warehousing, Big Data, In-Memory Data Management, und Machine Learning im Data Management Kontext.Das Buch dient als Lehrbuch für Studierende der Informatik, der Wirtschaft und der Wirtschaftsinformatik an Universitäten, Hochschulen und Fachschulen und zur industriellen Aus- und Weiterbildung.By Sandeep Kumar, K. Balachandran, Joong Hoon Kim, Jagdish Chand Bansal. 2024
This book is a collection of selected papers presented at the Fourth Congress on Intelligent Systems (CIS 2023), organized by…
CHRIST (Deemed to be University), Bangalore, India, under the technical sponsorship of the Soft Computing Research Society, India, during September 4–5, 2023. It includes novel and innovative work from experts, practitioners, scientists, and decision-makers from academia and industry. It covers topics such as the Internet of Things, information security, embedded systems, real-time systems, cloud computing, big data analysis, quantum computing, automation systems, bio-inspired intelligence, cognitive systems, cyber-physical systems, data analytics, data/web mining, data science, intelligence for security, intelligent decision-making systems, intelligent information processing, intelligent transportation, artificial intelligence for machine vision, imaging sensors technology, image segmentation, convolutional neural network, image/video classification, soft computing for machine vision, pattern recognition, human-computer interaction, robotic devices and systems, autonomous vehicles, intelligent control systems, human motor control, game playing, evolutionary algorithms, swarm optimization, neural network, deep learning, supervised learning, unsupervised learning, fuzzy logic, rough sets, computational optimization, and neuro-fuzzy systems.By Nur Syazreen Ahmad, Junita Mohamad-Saleh, Jiashen Teh. 2024
This book presents selected papers from the Proceedings of the International Conference 12th International Conference on Robotics, Vision, Signal Processing,…
and Power Applications ROVISP 2023, held in Penang, Malaysia, covering topic areas divided into the following tracks: (1) Robotics, Control, Mechatronics, and Automation; (2) Vision, Image and Signal Processing; (3) Telecommunication Systems and Applications; (4) Electronic Design and Applications; (5) Electrical Power, Energy, and Industrial Applications. Its content highlights state-of-the-art technologies adopted by the relevant industries which appeal to researchers and industrial practitioners working in the field.Die Digitalisierung und Entwicklungen im Gebiet der künstlichen Intelligenz haben in den letzten Jahren erhebliche Veränderungen in der Gesellschaft und…
der Unternehmenspraxis hervorgerufen. Aufkommende Technologien in den Feldern Big Data und Advanced Analytics werden auch im Controlling zunehmend diskutiert oder bereits eingesetzt. Dabei befinden sich der Wissensstand, inwieweit Big Data und Advanced Analytics das Controlling beeinflussen und verändern können, und die praktische Anwendung noch in einem frühen Stadium. Diese Arbeit befasst sich deshalb mit der Untersuchung der möglichen Auswirkungen von Big Data und Advanced Analytics im Controlling. Vor diesem Hintergrund werden die Einflüsse dieser digitalen Trends auf den Informationsversorgungsprozess des Controllings, auf die Erfüllung Controlling-spezifischer Anforderungen an Informationen und auf das Forecasting, die Budgetierung und die strategische Planung analysiert. Ferner werden praxisrelevante Herausforderungen, Grenzen und Risiken bei der Implementierung und Nutzung identifiziert sowie Implikationen zu deren Umgang zur Ausschöpfung der Potenziale abgeleitet.By Philip Ball. 2006
Philippus Aureolus Theophrastus Bombast von Hohenheim, who called himself Paracelsus, stands at the cusp of medieval and modern times. A…
contemporary of Luther, an enemy of the medical establishment, a scourge of the universities, an alchemist, an army surgeon, and a radical theologian, he attracted myths even before he died. His fantastic journeys across Europe and beyond were said to be made on a magical white horse, and he was rumored to carry the elixir of life in the pommel of his great broadsword. His name was linked with Faust, who bargained with the devil.Who was the man behind these stories? Some have accused him of being a charlatan, a windbag who filled his books with wild speculations and invented words. Others claim him as the father of modern medicine. Philip Ball exposes a more complex truth in The Devil's Doctor—one that emerges only by entering into Paracelsus's time. He explores the intellectual, political, and religious undercurrents of the sixteenth century and looks at how doctors really practiced, at how people traveled, and at how wars were fought. For Paracelsus was a product of an age of change and strife, of renaissance and reformation. And yet by uniting the diverse disciplines of medicine, biology, and alchemy, he assisted, almost in spite of himself, in the birth of science and the emergence of the age of rationalism. "Ball produces a vibrant, original portrait of a man of contradictions:" - Publishers WeeklyBy Daisy Hay. 2015
The first biography to give Mary Anne Lewis her due and to examine her singular marriage to Benjamin DisraeliWhen Mary…
Anne Lewis met Benjamin Disraeli, she was married to Wyndham Lewis, a rich, mildly successful politician at the center of nineteenth-century British high society. The three became friends and with his deep pockets Wyndham helped Disraeli—young, ambitious, and swimming in debt—get his start in the political arena. Mary Anne even referred to him as her "Parliamentary protégé." But when Wyndham suddenly died of a heart attack, Mary Anne's friendship with Disraeli (fifteen years her junior) soon evolved into a peculiarly romantic and undoubtedly advantageous marriage: Mary Anne avoided life as a widow, while Benjamin used her financial means to stay out of prison and make a run for office. Anecdotally the Disraelis cultivated an outrageous reputation. Once asked if he had read any new novels, Benjamin reportedly replied, "When I want to read a novel, I write one." Mary Anne, on the other hand, supposedly once told Queen Victoria that she always slept with her arms around her husband's neck. "My wife is a very clever woman," Benjamin said, "but she can never remember who came first, the Greeks or the Romans." An unusual story of Victorian romance and politics, Mr. and Mrs. Disraeli moves beyond the anecdotes to reveal the interior life of one of Britain's most influential couples. Often eclipsed by Benjamin, Mary Anne had at least as much political acumen as her husband, and this dual biography shows that she was frequently his voice of reason. In the wake of British Romanticism, Daisy Hay examines the paths available to women like Mary Anne, and chronicles a relationship that is surprising, unconventional, and deeply inspiring.This book constitutes the refereed post proceedings of the Third International Scientific and Practical Conference on Information Technologies and Intelligent…
Decision Making Systems, ITIDMS 2023, held in Moscow, Russia, during December, 12-14, 2023. The 18 full papers included in this book were carefully reviewed and selected from 54 submissions. The papers presented in this volume focus on topics such as digital, intellectual and information transformation, the development of computer models and the improvement of automated and computing processes.By Guoxiang Hou, Caikan Chen, Shenglei Qin, Yuan Gao, Kai Wang. 2024
This book provides a concise and comprehensive introduction to several basic methods with more attention to their theoretical basis and…
applications in fluid dynamics. Furthermore, some new ideas are presented in this book, for example, a method to solve the transition matrix by difference operator transformation. For this method, the book gives the definition of Fourier integral transformation of translation operator, and proves the transition matrix equaling to the differential operator transformation, so that it is extended to general situations of explicit, implicit, multi-layer difference equations, etc. This flexible approach is also used in the differential part. In addition, the book also includes six types of equivalent stability definitions in two ways and deeply analyzes their errors, stabilities and convergences of the difference equations. What is more important, some new scientific contributions on lattice Boltzmann method (LBM) in recent years are presented in the book as well. The authors write the book combining their ten years teaching experience and research results and this book is intended for graduate students who are interested in the area of computational fluid dynamics (CFD). Authors list some new research achievements, such as simplified lattice Boltzmann method, the simplified lattice Boltzmann flux solver and discrete unified gas kinetic scheme, and expect that this new information could give readers possible further investigating ideas in their future research on CFD area.By Obaid Ur-Rehman, Natasa Zivic. 2024
Dieses Buch gibt einen Einblick in die Herausforderungen der Datenauthentifizierung über drahtlose Kommunikationskanäle. Die Autoren gehen davon aus, dass die…
etablierten Standard-Authentifizierungsmechanismen nicht ausreichen, um Daten wie Sprache, Bilder und Videos über drahtlose Kanäle zu authentifizieren, da die drahtlose Kommunikation durch zahlreiche Störungen gekennzeichnet ist. Die Autoren schlagen neue Mechanismen vor, die auf so genannten Soft-Authentifizierungsalgorithmen basieren, die einige Änderungen an den zu schützenden Daten tolerieren. Die Autoren erklären, dass das Ziel dieser Algorithmen darin besteht, tolerant gegenüber inhaltlichen Änderungen auf Grund von Übertragungsfehler zu sein, aber dennoch in der Lage zu sein, Fälschungen zu erkennen. Ein weiterer Vorteil der Soft-Authentifizierungsalgorithmen besteht darin, dass sie in der Lage sind, die veränderten Stellen zu identifizieren und sie nach Möglichkeit zu korrigieren. Die Autoren zeigen, wie man dies erreicht, indem man die Datenmerkmale mit Hilfe von fehlerkorrigierenden Codes schützt. · Erörtert Methoden zur Authentifizierung von Daten (insbesondere von Bildern) bei Übertragungsstörungen, die bei der drahtlosen Kommunikation auftreten; · Stellt eine neue Klasse von Soft-Authentifizierungsmethoden vor, die anstelle der üblichen Hard-Authentifizierungsmethoden verwendet werden, um geringfügige Änderungen der Bilddaten zu tolerieren; · Verfügt über Authentifizierungsmethoden, die auf der Verwendung von Authentifizierungscodes und digitalen Wasserzeichen basierenBy Tin-Chih Toly Chen, Yun-Ju Lee. 2024
This book examines smart technologies and their invaluable role in augmenting the walking experience of mobile users. From meticulously planned…
walking routes to precise footprint detection and analysis, as well as cutting-edge fall detection and prevention mechanisms, these intelligent technologies have the potential to revolutionize healthy and smart walking. Against the backdrop of the post-COVID-19 era, where unrestricted mobility has become pivotal for restoring normalcy, the demand for smart healthcare solutions has soared. The book explores latest advances in sensor technology, cloud computing, deep learning, and networking and related innovative applications that can leverage smart technologies to enhance healthy walking.By Aleksei V. Bogoviz, Alexander E. Suglobov, Alexandr N. Maloletko, Olga V. Kaurova, Svetlana V. Lobova. 2021
This book is the very first book-length study devoted to the advances in technological development and systems research in cooperative…
economics. The chapters provide, first of all, a coherent framework for understanding and applying the concepts and approaches of complexity and systems science for the advanced study of cooperative networks and particular cooperative enterprises and communities. Second, the book serves as a unique source of reliable information on the frontier information technologies available for the production, consumer, credit, and agricultural cooperative enterprises, discussing predominant strategies, potential drivers of change, and responses to complex problems. Given the diverse range of backgrounds and advanced research results, researchers, decision-makers, and stakeholders from all fields of cooperative economics in any country of the world will undoubtedly benefit from this book.If you haven't modernized your data cleaning and reporting processes in Microsoft Excel, you're missing out on big productivity gains.…
And if you're looking to conduct rigorous data analysis, more can be done in Excel than you think. This practical book serves as an introduction to the modern Excel suite of features along with other powerful tools for analytics.George Mount of Stringfest Analytics shows business analysts, data analysts, and business intelligence specialists how to make bigger gains right from your spreadsheets by using Excel's latest features. You'll learn how to build repeatable data cleaning workflows with Power Query, and design relational data models straight from your workbook with Power Pivot. You'll also explore other exciting new features for analytics, such as dynamic array functions, AI-powered insights, and Python integration.Learn how to build reports and analyses that were previously difficult or impossible to do in Excel. This book shows you how to:Build repeatable data cleaning processes for Excel with Power QueryCreate relational data models and analysis measures with Power PivotPull data quickly with dynamic arraysUse AI to uncover patterns and trends from inside ExcelIntegrate Python functionality with Excel for automated analysis and reportingBy Sarah Horton, David Sloan. 2024
Accessibility is a core quality of digital products to be deliberately addressed throughout the development lifecycle. What Every Engineer Should…
Know About Digital Accessibility will prepare readers to integrate digital accessibility into their engineering practices. Readers will learn how to accurately frame accessibility as an engineering challenge so they are able to address the correct problems in the correct way.Illustrated with diverse perspectives from accessibility practitioners and advocates, this book describes how people with disabilities use technology, the nature of accessibility barriers in the digital world, and the role of engineers in breaking down those barriers. Accessibility competence for current, emerging, and future technologies is addressed through a combination of guiding principles, core attributes and requirements, and accessibility‑informed engineering practices.FEATURES Discusses how technology can support inclusion for people with disabilities and how rigorous engineering processes help create quality user experiences without introducing accessibility barriers Explains foundational principles and guidelines that build core competency in digital accessibility as they are applied across diverse and emerging technology platforms Highlights practical insights into how engineering teams can effectively address accessibility throughout the technology development lifecycle Uses international standards to define and measure accessibility quality Written to be accessible to non‑experts in the subject area, What Every Engineer Should Know About Digital Accessibility is aimed at students, professionals, and researchers in the field of software engineering.The Internet of Things (IoT) has numerous applications, including smart cities, industries, cloud-based apps, smart homes, and surveillance.The Internet of…
Things (IoT) enables smarter living by connecting devices, people, and objects. As networking became a crucial aspect of the Internet, rigorous design analysis led to the development of new research areas.The Internet of Things has revolutionized daily living in countless ways. It enables communication between buildings, people, portable gadgets, and vehicles, facilitating mobility. Smart cities and cloud-based data have transformed corporate practices. With billions of connected gadgets, everything will soon be able to communicate remotely. IoT networks, whether public or private, rely significantly on machine learning and software-defined networking. Indian and other governments have approved various research projects on IoT-based networking technologies. This field of study will significantly impact society in the future.Researchers are concerned about the many application areas and driving forces behind smart cities. The authors aim to provide insights into software-defined networking, artificial intelligence, and machine learning technologies used in IoT and networking. The framework focuses on practical applications and infrastructures. The book includes practical challenges, case studies, innovative concepts, and other factors that impact the development of realistic scenarios for smart surveillance. It also highlights innovative technology, designs, and algorithms that can accelerate the creation of smart city concepts.This resource includes real-world applications and case studies for smart city technology, enormous data management, and machine learning prediction, all with confidentiality and safety problems.By Roderick S. Graham, 'Shawn K. Smith. 2024
Cybercrime and Digital Deviance, Second Edition, combines insights from sociology, criminology, psychology, and cybersecurity to explore cybercrimes such as hacking,…
identity theft, and romance scams, along with forms of digital deviance such as pornography addiction, trolling, and “canceling” people for perceived violations of norms.Other issues are explored including cybercrime investigations, nation-state cybercrime, the use of algorithms in policing, cybervictimization, and expanded discussion of the theories used to explain cybercrime. Graham and Smith conceptualize the online space as a distinct environment for social interaction, framing their work with assumptions informed by their respective work in urban sociology and spatial criminology, and offering an engaging entry point for understanding what may appear to be a technologically complex course of study. The authors apply a modified version of a typology developed by David Wall: cybertrespass, cyberfraud, cyberviolence, and cyberpornography. This typology is simple enough for students just beginning their inquiry into cybercrime, while its use of legal categories of trespassing, fraud, violent crimes against persons, and moral transgressions provides a solid foundation for deeper study. In this edition each chapter includes a new “Current Events and Critical Thinking” section, using concepts from the chapter to explore a specific event or topic like the effect of disinformation on social cohesion and politics.Taken together, Graham and Smith’s application of a digital environment and Wall’s cybercrime typology makes this an ideal upper-level text for students in sociology and criminal justice. It is also an ideal introductory text for students within the emerging disciplines of cybercrime and cybersecurity.