There are many myths and mistakes which make the topics of artificial intelligence complex and confusing. But the truth is that the foundations of AI...
Design and Implement a WorldClass Replenishment System, CustomMade to Meet the Needs of Your Organization!In Custom Kanban: Designing the System to Meet the Needs of...
Design and Implement a WorldClass Replenishment System, CustomMade to Meet the Needs of Your Organization!In Custom Kanban: Designing the System to Meet the Needs of...
Customer and Business Analytics: Applied Data Mining for Business Decision Making Using R explains and demonstrates, via the accompanying opensource software, how advanced analytical tools...
Customer and Business Analytics: Applied Data Mining for Business Decision Making Using R explains and demonstrates, via the accompanying opensource software, how advanced analytical tools...
Exceptional customer service is crucial to a successful phone based business. Quality service can secure customer loyalty, while poor service can lose it. This concise...
Based on extensive clinical, histological, and experimental studies, this guide serves as an authoritative source of information on the epidemiology, etiology, pathogenesis, diagnosis, and treatment...
Cutaneous Tcell lymphoma (CTCL) is a general term for many lymphomas of the skin including mycosis Fungoides and Sezary syndrome. This book presents the state...
The contamination of both drinking and recreational water supplies by cyanobacteria is increasingly a cause for concern worldwide. While contamination causes livestock deaths with relative...
Cyber and Electromagnetic Threats in Modern Relay Protection provides a detailed overview of the vulnerabilities of digital protection relays to natural and intentional destructive impacts,...
With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving wellorganized actors and highly sophisticated organizations. Combining...
The sophisticated methods used in recent highprofile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often...
<div class="dynamic-checkout__content" id="dynamic-checkout-cart" data-shopify="dynamic-checkout-cart"> <shopify-accelerated-checkout-cart wallet-configs="[{"name":"shop_pay","wallet_params":{"shopId":73758048501,"merchantName":"Ergodebooks","personalized":true}},{"name":"amazon_pay","wallet_params":{"checkoutLanguage":"en_US","ledgerCurrency":"USD","placement":"Cart","sandbox":false,"merchantId":"A1G1ZY975O1T6J","productType":"PayAndShip","design":"C0002"}},{"name":"paypal","wallet_params":{"shopId":73758048501,"countryCode":"US","merchantName":"Ergodebooks","phoneRequired":true,"companyRequired":false,"shippingType":"shipping","shopifyPaymentsEnabled":true,"hasManagedSellingPlanState":null,"requiresBillingAgreement":false,"merchantId":"L873BZSC9NMQS","sdkUrl":"https://www.paypal.com/sdk/js?components=buttons\u0026commit=false\u0026currency=USD\u0026locale=en_US\u0026client-id=AbasDhzlU0HbpiStJiN1KRJ_cNJJ7xYBip7JJoMO0GQpLi8ePNgdbLXkC7_KMeyTg8tnAKW4WKrh9qmf\u0026merchant-id=L873BZSC9NMQS\u0026intent=authorize"}}]" access-token="c0f52a66b386e9fa5c0ab4c2febc737c" buyer-country="US" buyer-locale="en" buyer-currency="USD" shop-id="73758048501" cart-id="75ce1c9b77fa417e06e2b5bf80f4aa5a" enabled-flags="["2d75a54c"]" > <div class="wallet-button-wrapper"> <ul class='wallet-cart-grid wallet-cart-grid--skeleton' role="list" data-shopify-buttoncontainer="true"> <li data-testid='grid-cell' class='wallet-cart-button-container'><div class='wallet-cart-button wallet-cart-button__skeleton' role='button' disabled aria-hidden='true'> </div></li><li data-testid='grid-cell' class='wallet-cart-button-container'><div class='wallet-cart-button wallet-cart-button__skeleton' role='button' disabled aria-hidden='true'> </div></li><li data-testid='grid-cell' class='wallet-cart-button-container'><div class='wallet-cart-button wallet-cart-button__skeleton' role='button' disabled aria-hidden='true'> </div></li> </ul> </div> </shopify-accelerated-checkout-cart> <small id="shopify-buyer-consent" class="hidden" aria-hidden="true" data-consent-type="subscription"> One or more of the items in your cart is a recurring or deferred purchase. By continuing, I agree to the <span id="shopify-subscription-policy-button">cancellation policy</span> and authorize you to charge my payment method at the prices, frequency and dates listed on this page until my order is fulfilled or I cancel, if permitted. </small> </div>
Stay in the know
Subscribe to our newsletter and stay updated on latest offers, discounts and events near you.
For MAP (Minimum Advertised Price) violations, please contact: map@ergode.com
For Intellectual Property (IP) or Trademark concerns, please contact: ip@ergode.com
⚠️ California Proposition 65 Warning: Some products sold on this website may expose you to chemicals known to the State of California to cause cancer, birth defects, or other reproductive harm. For more information, visit www.P65Warnings.ca.gov.
There are many myths and mistakes which make the topics of artificial intelligence complex and confusing. But the truth is that the foundations of AI...
Design and Implement a WorldClass Replenishment System, CustomMade to Meet the Needs of Your Organization!In Custom Kanban: Designing the System to Meet the Needs of...
Design and Implement a WorldClass Replenishment System, CustomMade to Meet the Needs of Your Organization!In Custom Kanban: Designing the System to Meet the Needs of...
Customer and Business Analytics: Applied Data Mining for Business Decision Making Using R explains and demonstrates, via the accompanying opensource software, how advanced analytical tools...
Customer and Business Analytics: Applied Data Mining for Business Decision Making Using R explains and demonstrates, via the accompanying opensource software, how advanced analytical tools...
Exceptional customer service is crucial to a successful phone based business. Quality service can secure customer loyalty, while poor service can lose it. This concise...
Based on extensive clinical, histological, and experimental studies, this guide serves as an authoritative source of information on the epidemiology, etiology, pathogenesis, diagnosis, and treatment...
Cutaneous Tcell lymphoma (CTCL) is a general term for many lymphomas of the skin including mycosis Fungoides and Sezary syndrome. This book presents the state...
The contamination of both drinking and recreational water supplies by cyanobacteria is increasingly a cause for concern worldwide. While contamination causes livestock deaths with relative...
Cyber and Electromagnetic Threats in Modern Relay Protection provides a detailed overview of the vulnerabilities of digital protection relays to natural and intentional destructive impacts,...
With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving wellorganized actors and highly sophisticated organizations. Combining...
The sophisticated methods used in recent highprofile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often...
Sale price$49.18Regular price$70.26
Quantity
Add to cart
Choosing a selection results in a full page refresh.