Warning: file_put_contents(cache/omni_6ded29d9716c3df7dd3adc9f44935ed3.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Intertwingled
The Work and Influence of Ted Nelson...
View Book →
Reading the post-Apartheid city : Durbanite and Capetonian literary topogaphies in selected texts be
Includes bibliographical references (pages 255-282). Description based on print version record; resource not viewed....
View Book →
Literature and media : after 1989
"This book discusses the direction of changes in contemporary culture at the turn of the 20th and 21st centuries in Poland on the example of mutual relationships between literature and the media, such...
View Book →
Blazor for ASP NET Web Forms Developers
...
View Book →Flashbacks : a personal and cultural history of an era : an autobiography
405 pages, 15 unnumbered pages of plates : 24 cm...
View Book →
Software & Hardware Collide
The Best of Solid...
View Book →
The Cloud-to-Thing Continuum
Opportunities and Challenges in Cloud, Fog and Edge Computing...
View Book →
How the World Changed Social Media
...
View Book →
Real-time Linked Dataspaces
Enabling Data Ecosystems for Intelligent Systems...
View Book →
Models, Methods and Tools for Product Service Design
The Manutelligence Project...
View Book →
Defense against the Black Arts
How Hackers Do What They Do and How to Protect against It...
View Book →China Mail 1947-10-20
Hold-Up In Paris. Threat Of General Strike In France. Inquiry Into Po To Sinking. VIOLENCE USHERS IN FRENCH ELECTIONS. NEW ECONOMIC POLICE IN CHINA. Special Grards To Be Put On Railways. AMMON SILENT ...
View Book →
Promotion and marketing communications
Includes bibliographical references. Description based on print version record; resource not viewed....
View Book →
Machine Learning for Cyber Physical Systems
Selected papers from the International Conference ML4CPS 2018...
View Book →
Digital Business Models
Concepts, Models, and the Alphabet Case Study...
View Book →
Interdisciplinary Insights for Digital Touch Communication
...
View Book →
Your Post has been Removed
Tech Giants and Freedom of Speech...
View Book →
Demystifying Internet of Things Security
Successful IoT Device/Edge and Platform Security Deployment...
View Book →
Corea, the hermit nation. I. Ancient and mediæval history. II. Political and social Corea. III. Mod
Also available in digital form on the Internet Archive Web site. Bibliography: p. [xv]-xxi. Also available in digital form....
View Book →
Access Controlled
The Shaping of Power, Rights, and Rule in Cyberspace...
View Book →The Royal Air Force Quarterly Volume 1 1930 [Great Britain]
Digitised by Google Books from the collection of the University of Minnesota, see Source below. If necessary, click on Show More, below. There appear to be four quarterly issues in the digital ...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →
Rethinking the Internet of Things
A Scalable Approach to Connecting Everything...
View Book →
History of Mathematics Teaching and Learning
Achievements, Problems, Prospects...
View Book →
From orientalism to cultural capital : the myth of Russia in British literature of the 1920s
". . . presents a fascinating account of the wave of Russophilia that pervaded British literary culture in the early twentieth century. The authors bring a new approach to the study of this period, ex...
View Book →
Regulating Content on Social Media
Copyright, Terms of Service and Technological Features...
View Book →
Fallibility at Work
Rethinking Excellence and Error in Organizations...
View Book →
The Restless Compendium
Interdisciplinary Investigations of Rest and Its Opposites...
View Book →China Mail 1960-05-20
'War if anyone tried to pinch Hongkong'. NO DISCUSSIONS ON COLONY. Montgomery's assurance on talks in China. The Earl of Dalkeith's by-election victory. PRESENT STRENGTH. 'Queen Mother to remarry'. U....
View Book →
The Missing Link
An Introduction to Web Development and Programming...
View Book →
Earth Observation Open Science and Innovation
...
View Book →Europe since Napoleon
1003 pages : 20 cm...
View Book →
Operating Systems and Middleware
Supporting Controlled Interaction...
View Book →
Jane Austen reflections of a reader : Nora Bartlett
Includes bibliographical references (pages 215-221) and index. Description based on online resource; title from PDF title page (Open Book Publishers website; viewed on 2021-02-08)...
View Book →
The United States Congress
Includes bibliographical references (pages [170]-171) and index. Description based on print version record; resource not viewed....
View Book →Husbands & wives
Includes index...
View Book →
Intel Galileo and Intel Galileo Gen 2
API Features and Arduino Projects for Linux Programmers...
View Book →
Multimedia Big Data Computing for IoT Applications
Concepts, Paradigms and Solutions...
View Book →
Shipping and Globalization in the Post-War Era
Contexts, Companies, Connections...
View Book →
Transforming Trauma
Resilience and Healing Through Our Connections With Animals...
View Book →Quantum love : use your body's atomic energy to create the relationship you desire
xi, 375 pages : 23 cm...
View Book →The last wild island : saving Tetepare
vii, 263 pages, 12 unnumbered pages of plates : 21 cm...
View Book →China Mail 1949-03-17
HONG KONG'S RECORD BUDGET. Soft Drink Duty Raised﹔ Local Postage Increased. DEFENCE THE KEYNOTE. Colony's Life Blood. New Industries. Future Obscure. Spending Pruned. As An Entrepot. Education. New ...
View Book →
Micro-, Meso- and Macro-Connectomics of the Brain
...
View Book →
The unspoken alliance : Israel's secret relationship with apartheid South Africa
x, 324 p. : 25 cm...
View Book →Murder : a tale of modern American life
283 pages ; 23 cm...
View Book →
Foundations of Quantum Theory
From Classical Concepts to Operator Algebras...
View Book →
The Impact of Digital Technologies on Public Health in Developed and Developing Countries
18th International Conference, ICOST 2020, Hammamet, Tunisia, June 24–26, 2020, Proceedings...
View Book →
Autonomous Control for a Reliable Internet of Services
Methods, Models, Approaches, Techniques, Algorithms, and Tools...
View Book →
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →
The West in early cinema : after the beginning
Filmography: pages [415]-425. Includes bibliographical references (pages [427]-453) and index. Description based on print version record; resource not viewed....
View Book →
Legacies of space and intangible heritage : archaeology, ethnohistory, and the politics of cultural
"An interdisciplinary exploration of the intersections between the study and management of physical sites and reproduction of intangible cultural legacies. Nine case studies that explore different way...
View Book →
CIA Reading Room cia-rdp90-00494r001100710064-8: WONG: SECRET CIA PHONE GOT ONLY WRONG NUMBERS
Sanitized Copy Approved for Release 2010/07/26: CIA-RDP90-00494RO01100710064-8 'IU'Hbi~h['fi "rtiser Wong: Secret CIA phone got only wrong numbers By Walter Wright Advertiser Staff Writer Ronald Rewal...
View Book →
Computer and Information Sciences
31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings...
View Book →
Gaming Rhythms
Play and Counterplay from the Situated to the Global...
View Book →
Hong Kong Telegraph 1935-01-10
FIGHT TO GUARD SILVER PRICE. U.S. TREASURY GIVES REASSURANCE. CONTINUING PURCHASES DESPITE CHINA PLEA. SHANGHAI REACTION. HEAVY SELLING. H.K. DOLLAR RISES. PER CAPITA DEBTS. U.S. BETTER OFF THAN BRITA...
View Book →
Manual of Digital Earth
...
View Book →
Software Above the Level of a Single Device
The Implications...
View Book →
European Somalis' Post-Migration Movements
Mobility Capital and the Transnationalisation of Resources...
View Book →
The Piracy Crusade
How the Music Industry's War on Sharing Destroys Markets and Erodes Civil Liberties...
View Book →
Scepticism and belief in English witchcraft drama, 1538-1681
This is a study of the representation of witches in early modern English drama, organised around the themes of scepticism and belief. It covers the entire early modern period, including the Restoratio...
View Book →
New approaches to the study of esotericism
"This volume offers new approaches to some of the biggest persistent challenges in the study of esotericism and beyond. Commonly understood as a particularly "Western" undertaking consisting of religi...
View Book →
Translating feminism in China : gender, sexuality and censorship
Includes bibliographical references and index. Description based on print version record; resource not viewed....
View Book →
Connectionist Representations of Tonal Music
Discovering Musical Patterns by Interpreting Artificial Neural Networks...
View Book →
Big Data in Context
Legal, Social and Technological Insights...
View Book →
Data Science with Microsoft SQL Server 2016
...
View Book →
European E-Democracy in Practice
...
View Book →
The Narrative Subject
Storytelling in the Age of the Internet...
View Book →
Mobile Research Methods
Opportunities and challenges of mobile research methodologies...
View Book →
Wikipedia @ 20 : stories of an incomplete revolution
"Founders, contributors, scholars, teachers, and students reflect on Wikipedia's first 20 years"-- Provided by publisher....
View Book →
eIoT
The Development of the Energy Internet of Things in Energy Infrastructure...
View Book →
Business concepts for healthcare providers : a quick reference for midwives, NPs, PAs, CNSs and othe
xiii, 116 p. ; 23 cm...
View Book →
Digital Kenya
An Entrepreneurial Revolution in the Making...
View Book →
The Internet Myth
From the Internet Imaginary to Network Ideologies...
View Book →
Library and Information Sciences
Trends and Research...
View Book →
Access Denied
The Practice and Policy of Global Internet Filtering...
View Book →
Cultural Heritage in a Changing World
...
View Book →
Between Psychology and Philosophy
East-West Themes and Beyond...
View Book →
The Definitive Guide to Graph Databases
for the RDBMS Developer...
View Book →
The Sopranos
Includes bibliographical references (pages [211]-212) and index. Description based on print version record; resource not viewed....
View Book →
Middlebrow cinema
Includes bibliographical references and index. Description based on print version record; resource not viewed....
View Book →
Preparing for Life in a Digital Age
The IEA International Computer and Information Literacy Study International Report...
View Book →
Paths
Why is life filled with so many detours?...
View Book →
Impact of Information Society Research in the Global South
...
View Book →
The anatomy of post-communist regimes : a conceptual framework
"This book offers a single, coherent framework of the political, economic, and social phenomena that characterize post-communist regimes. Focusing on Central Europe, the post-Soviet countries and Chin...
View Book →
Shrines and pilgrimage in the modern world : new itineraries into the sacred
Includes bibliographical references (pages 331-358) and index. Description based on print version record; resource not viewed....
View Book →
Blockchain and Crypt Currency
Building a High Quality Marketplace for Crypt Data...
View Book →
25 Secrets for Faster ASP.NET Applications
...
View Book →
Monroe Frequent Contributor: Steve Winchester
(To the Monroe Institute Website ) (To the Monroe Institute Archives - Table of Contents ) (To the Monroe Institute Frequent Contributors - Table of Contents ) TABLE OF CONTENTS 1 Stev...
View Book →
Opening Science
The Evolving Guide on How the Internet is Changing Research, Collaboration and Scholarly Publishing...
View Book →
Informatics in the Future
Proceedings of the 11th European Computer Science Summit (ECSS 2015), Vienna, October 2015...
View Book →
Manifesto of the New Economy
Institutions and Business Models of the Digital Society...
View Book →
Research On and Activities For Mathematically Gifted Students
...
View Book →
Blown to Bits
Your Life, Liberty, and Happiness After the Digital Explosion...
View Book →
Dangerous to know
"Set in the lush countryside of Normandy, France, this new novel of suspense featuring Lady Emily Hargreaves is filled with intrigue, romance, mysterious deaths, and madness"--Page 4 of cover...
View Book →
Internet of Things
Information Processing in an Increasingly Connected World...
View Book →
Niagara : a history of the Falls
xii, 371 pages, 24 unnumbered pages of plates : 24 cm...
View Book →
Realizing Islam : the Tijāniyya in North Africa and the eighteenth-century Muslim world
"The Tijaniyya is the largest Sufi order in West and North Africa. In this unprecedented analysis of the Tijaniyya's origins and development in the late eighteenth century, Zachary Valentine Wright si...
View Book →
Social Theory after the Internet
Media, Technology, and Globalization...
View Book →
Academia in transformation : scholars facing the Arab uprisings
"This book provides an insight into the transformation of the academic landscape in the aftermath of the Arab uprisings. It analyses how the academic discourse in and on the MENA region has changed a...
View Book →
Beej's Guide to Network Programming
Using Internet Sockets...
View Book →Edison Notebook NP021
PN-86-03-04 (1886) The dated entries in this notebook, which has been used in both directions, cover the periods March and October 1886. The technical entries are by Edison and relate to the phonoplex...
View Book →
Performance Tuning with SQL Server Dynamic Management Views
...
View Book →
Data-Driven Policy Impact Evaluation
How Access to Microdata is Transforming Policy Design...
View Book →
Linux Network Administrator's Guide
Unix-compatible operating system...
View Book →Children's Subject Headings
3-D display systems USE Three-dimensional display systems 3-D printing USE Three-dimensional printing 3D display systems USE Three-dimensional display systems 3D printing USE Three-dimensional printin...
View Book →
The Amazing Journey of Reason
from DNA to Artificial Intelligence...
View Book →
Enabling Things to Talk
Designing IoT solutions with the IoT Architectural Reference Model...
View Book →
The Big Data Agenda
Data Ethics and Critical Data Studies...
View Book →CIA Reading Room cia-rdp78-06365a000700090014-2: CONGRESSIONAL RECORD - SENATE
3 Approved For Releah#r1999/09/01 : CIA-RDP78-06365000070009001472, A*rit 21 8332 CONGRESSIONAL RECORD ? SENATE ? propb'sal. Rut if all else fails, it is his stiorn responsibility to enforce the law: ...
View Book →