Israel/Palestine and the paradoxes of academic freedom [Essay]
Judith P. Butler
The Oxford Handbook of Spinoza
Michael Della Rocca
OXFORD HANDBOOKS SERIES (1)
Python Challenges 100 Proven Programming Tasks Designed to Prepare ...
Michael Inden
The Number of the Beast
Robert A. Heinlein
Distilling Ideas: An Introduction to Mathematical Thinking
Brian P. Katz & Michael Starbird & Michael P. Starbird
Text Mining for Information Professionals - An Uncharted Territory
Manika Lamba & Margam Madhusudhan
Modern Methods in Mathematical Physics: Integral Equations in ...
Vladimir Ryzhov & Tatiana Fedorova & Kirill Safronov & Shaharin Anwar Sulaiman & Samsul Ariffin Abdul Karim
Handbook of Neurotoxicity
Richard M. Kostrzewa
Knowledge-Based Software Engineering: 2022: Proceedings of the ...
Maria Virvou & Takuya Saruwatari & Lakhmi C. Jain
Beyond Edge Computing: Swarm Computing and Ad-Hoc Edge Clouds
Ana Juan Ferrer
Data Science for Entrepreneurship: Principles and Methods for ...
Werner Liebregts & Willem-Jan van Den Heuvel & Arjan van Den Born
Higher Education Computer Science: A Manual of Practical Approaches
Jenny Carter & Michael O'Grady & Clive Rosen
Applications of Computational Intelligence in Management & Mathematics: ...
Madhusudhan Mishra & Nishtha Kesswani & Imene Brigui
Social Edge Computing: Empowering Human-Centric Edge Computing, ...
Dong Wang & Daniel 'Yue' Zhang
Blockchain Scalability
Zibin Zheng & Wuhui Chen & Huawei Huang
Security and Risk Analysis for Intelligent Edge Computing
Gautam Srivastava & Uttam Ghosh & Jerry Chun-Wei Lin
Language Electrified: Principles, Methods, and Future Perspectives ...
Mirko Grimaldi & Elvira Brattico & Yury Shtyrov
The Project Management Office: Setup and Benefits
Gerhard Ortner
Fuzzy Petri Nets for Knowledge Representation, Acquisition and ...
Hua Shi & Hu-Chen Liu
Embedded Machine Learning for Cyber-Physical, IoT, and Edge ...
Sudeep Pasricha & Muhammad Shafique
Product Lifecycle Management (Volume 5): What Happens Across ...
John Stark
Advanced Techniques of Artificial Intelligence in IT Security ...
Marcin Korytkowski
Adversarial Multimedia Forensics
Ehsan Nowroozi