This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011....
Ethnic minorities form a very substantial proportion of the population of China, with over 100 million people in 55 formally designated minority groups inhabiting over...
Recent developments on wireless communication technology have resulted in tremendous innovations to make broadband wireless networks able to compete with 3G cellular network. IEEE 802.16X...
From 1978 through the turn of the century, China was transformed from a stateowned economy into a predominantly private economy. This fundamental change took place...
ISGC 2010, The International Symposium on Grid Computing was held at Academia Sinica, Taipei, Taiwan, March, 2010. The 2010 symposium brought together prestigious scientists and...
This book aims to discuss in depth the current state of research and practice in database security. It documents progress and provides researchers and students...
BEWARE OF COUNTERFEIT BOOKS. Readers have reported that Amazon's 3rdparty sellers are selling counterfeit versions; the counterfeit pages have misprints, missing pages or pages in...
Beloved and critically acclaimed author Lin Jensen returns with this bounteous volume exploring what the poet Gerard Manley Hopkins calls 'deep down things.' Richly informed...
Beloved and critically acclaimed author Lin Jensen returns with this bounteous volume exploring what the poet Gerard Manley Hopkins calls 'deep down things.' Richly informed...
Designing Stress Resistant Organizations demonstrates, in a persuasive way, how computational organization theory can be applied to advance the field of management with its successful...
Online emotional experiences and their relationships to cognitive states are of growing interest, especially in the service sectors. This study investigates one emotional experience enjoyment...
Build your own intelligent agent systemIntelligent agent technology is a tool of modern computer science that can be used to engineer complex computer programmes that...
<div class="dynamic-checkout__content" id="dynamic-checkout-cart" data-shopify="dynamic-checkout-cart"> <shopify-accelerated-checkout-cart wallet-configs="[{"name":"shop_pay","wallet_params":{"shopId":73758048501,"merchantName":"Ergodebooks","personalized":true}},{"name":"amazon_pay","wallet_params":{"checkoutLanguage":"en_US","ledgerCurrency":"USD","placement":"Cart","sandbox":false,"merchantId":"A1G1ZY975O1T6J","productType":"PayAndShip","design":"C0002"}},{"name":"paypal","wallet_params":{"shopId":73758048501,"countryCode":"US","merchantName":"Ergodebooks","phoneRequired":true,"companyRequired":false,"shippingType":"shipping","shopifyPaymentsEnabled":true,"hasManagedSellingPlanState":false,"requiresBillingAgreement":false,"merchantId":"L873BZSC9NMQS","sdkUrl":"https://www.paypal.com/sdk/js?components=buttons\u0026commit=false\u0026currency=USD\u0026locale=en_US\u0026client-id=AbasDhzlU0HbpiStJiN1KRJ_cNJJ7xYBip7JJoMO0GQpLi8ePNgdbLXkC7_KMeyTg8tnAKW4WKrh9qmf\u0026merchant-id=L873BZSC9NMQS\u0026intent=authorize"}}]" access-token="c0f52a66b386e9fa5c0ab4c2febc737c" buyer-country="US" buyer-locale="en" buyer-currency="USD" shop-id="73758048501" cart-id="da0cf439bd4daee6587cbaa434f63e40" > <div class="wallet-button-wrapper"> <ul class='wallet-cart-grid wallet-cart-grid--skeleton' role="list" data-shopify-buttoncontainer="true"> <li data-testid='grid-cell' class='wallet-cart-button-container'><div class='wallet-cart-button wallet-cart-button__skeleton' role='button' disabled aria-hidden='true'> </div></li><li data-testid='grid-cell' class='wallet-cart-button-container'><div class='wallet-cart-button wallet-cart-button__skeleton' role='button' disabled aria-hidden='true'> </div></li><li data-testid='grid-cell' class='wallet-cart-button-container'><div class='wallet-cart-button wallet-cart-button__skeleton' role='button' disabled aria-hidden='true'> </div></li> </ul> </div> </shopify-accelerated-checkout-cart> <small id="shopify-buyer-consent" class="hidden" aria-hidden="true" data-consent-type="subscription"> One or more of the items in your cart is a recurring or deferred purchase. By continuing, I agree to the <span id="shopify-subscription-policy-button">cancellation policy</span> and authorize you to charge my payment method at the prices, frequency and dates listed on this page until my order is fulfilled or I cancel, if permitted. </small> </div>
Stay in the know
Subscribe to our newsletter and stay updated on latest offers, discounts and events near you.
For MAP (Minimum Advertised Price) violations, please contact: map@ergode.com
For Intellectual Property (IP) or Trademark concerns, please contact: ip@ergode.com
⚠️ California Proposition 65 Warning: Some products sold on this website may expose you to chemicals known to the State of California to cause cancer, birth defects, or other reproductive harm. For more information, visit www.P65Warnings.ca.gov.
This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011....
Ethnic minorities form a very substantial proportion of the population of China, with over 100 million people in 55 formally designated minority groups inhabiting over...
Recent developments on wireless communication technology have resulted in tremendous innovations to make broadband wireless networks able to compete with 3G cellular network. IEEE 802.16X...
From 1978 through the turn of the century, China was transformed from a stateowned economy into a predominantly private economy. This fundamental change took place...
ISGC 2010, The International Symposium on Grid Computing was held at Academia Sinica, Taipei, Taiwan, March, 2010. The 2010 symposium brought together prestigious scientists and...
This book aims to discuss in depth the current state of research and practice in database security. It documents progress and provides researchers and students...
BEWARE OF COUNTERFEIT BOOKS. Readers have reported that Amazon's 3rdparty sellers are selling counterfeit versions; the counterfeit pages have misprints, missing pages or pages in...
Beloved and critically acclaimed author Lin Jensen returns with this bounteous volume exploring what the poet Gerard Manley Hopkins calls 'deep down things.' Richly informed...
Beloved and critically acclaimed author Lin Jensen returns with this bounteous volume exploring what the poet Gerard Manley Hopkins calls 'deep down things.' Richly informed...
Designing Stress Resistant Organizations demonstrates, in a persuasive way, how computational organization theory can be applied to advance the field of management with its successful...
Online emotional experiences and their relationships to cognitive states are of growing interest, especially in the service sectors. This study investigates one emotional experience enjoyment...
Build your own intelligent agent systemIntelligent agent technology is a tool of modern computer science that can be used to engineer complex computer programmes that...
Sale price$90.05Regular price$128.64
Quantity
Add to cart
Choosing a selection results in a full page refresh.