Boundaries of Privacy: Dialectics of Disclosure
Sandra Petronio
Our Gated Community
G. R. Jordan
Highlands and Islands Detective Thriller (10)
Q&A for Deepak
Fred Alan Wolf
Medieval Philosophy: A History of Philosophy without Any Gaps
Peter Adamson
Christentum und Gnosis: Aufsätze
Walther Eltester
Text Mining for Information Professionals - An Uncharted Territory
Manika Lamba & Margam Madhusudhan
Modern Methods in Mathematical Physics: Integral Equations in ...
Vladimir Ryzhov & Tatiana Fedorova & Kirill Safronov & Shaharin Anwar Sulaiman & Samsul Ariffin Abdul Karim
Handbook of Neurotoxicity
Richard M. Kostrzewa
Knowledge-Based Software Engineering: 2022: Proceedings of the ...
Maria Virvou & Takuya Saruwatari & Lakhmi C. Jain
Beyond Edge Computing: Swarm Computing and Ad-Hoc Edge Clouds
Ana Juan Ferrer
Data Science for Entrepreneurship: Principles and Methods for ...
Werner Liebregts & Willem-Jan van Den Heuvel & Arjan van Den Born
Higher Education Computer Science: A Manual of Practical Approaches
Jenny Carter & Michael O'Grady & Clive Rosen
Applications of Computational Intelligence in Management & Mathematics: ...
Madhusudhan Mishra & Nishtha Kesswani & Imene Brigui
Social Edge Computing: Empowering Human-Centric Edge Computing, ...
Dong Wang & Daniel 'Yue' Zhang
Blockchain Scalability
Zibin Zheng & Wuhui Chen & Huawei Huang
Security and Risk Analysis for Intelligent Edge Computing
Gautam Srivastava & Uttam Ghosh & Jerry Chun-Wei Lin
Language Electrified: Principles, Methods, and Future Perspectives ...
Mirko Grimaldi & Elvira Brattico & Yury Shtyrov
The Project Management Office: Setup and Benefits
Gerhard Ortner
Fuzzy Petri Nets for Knowledge Representation, Acquisition and ...
Hua Shi & Hu-Chen Liu
Embedded Machine Learning for Cyber-Physical, IoT, and Edge ...
Sudeep Pasricha & Muhammad Shafique
Product Lifecycle Management (Volume 5): What Happens Across ...
John Stark
Advanced Techniques of Artificial Intelligence in IT Security ...
Marcin Korytkowski
Adversarial Multimedia Forensics
Ehsan Nowroozi