Service Alert
Retard dans la livraison de CDs
Nous accusons actuellement un retard dans la livraison de CDs. Toutes les demandes de CDs seront traitées le plus rapidement possible. Nous nous excusons de tout inconvénient.
Nous accusons actuellement un retard dans la livraison de CDs. Toutes les demandes de CDs seront traitées le plus rapidement possible. Nous nous excusons de tout inconvénient.
Articles 1 à 20 sur 3104
Par Matt Zigler. 2023
The Maker movement has been an excellent opportunity for people to become producers rather than just consumers, and schools are…
recognizing the value of offering students the tools, materials, and skills necessary to design sophisticated and meaningful projects. But teaching technical skills should not be the end goal: At its best, a Maker education teaches students to think and act in creative ways that can be applied to difficult challenges in all areas of life.Three Modes of Making provides a framework for Maker courses in upper grades that teach students creative-process skills through three key Maker modes: Imitation, Modification, and Innovation. Educators will learn the differences between the three Maker modes, their associated skill sets, and gain concrete methods to teach, document, and assess these skills. Through this approach, teachers will enable students to apply them to different creative needs.By focusing on how to teach skill development rather than merely how to build specific objects, Three Modes of Making enables students to improve and enhance their creative skills, and learn ways to apply them to a wide variety of challenges. This book is a road map to developing the creative problem solvers that the world needs for the future.Par Andrew Hoffman. 2024
In the first edition of this critically acclaimed book, Andrew Hoffman defined the three pillars of application security: reconnaissance, offense,…
and defense. In this revised and updated second edition, he examines dozens of related topics, from the latest types of attacks and mitigations to threat modeling, the secure software development lifecycle (SSDL/SDLC), and more.Hoffman, senior staff security engineer at Ripple, also provides information regarding exploits and mitigations for several additional web application technologies such as GraphQL, cloud-based deployments, content delivery networks (CDN) and server-side rendering (SSR). Following the curriculum from the first book, this second edition is split into three distinct pillars comprising three separate skill sets:Pillar 1: Recon—Learn techniques for mapping and documenting web applications remotely, including procedures for working with web applicationsPillar 2: Offense—Explore methods for attacking web applications using a number of highly effective exploits that have been proven by the best hackers in the world. These skills are valuable when used alongside the skills from Pillar 3.Pillar 3: Defense—Build on skills acquired in the first two parts to construct effective and long-lived mitigations for each of the attacks described in Pillar 2.Par Kai Cheng Thom. 2023
&“Required reading for the untamed soul . . . reminded me how to love others and myself.&”—Glennon Doyle, #1 New…
York Times bestselling author of UntamedA transformative collection of intimate and lyrical love letters that offer a path toward compassion, forgiveness, and self-acceptance.What happens when we imagine loving the people—and the parts of ourselves—that we do not believe are worthy of love? Kai Cheng Thom grew up a Chinese Canadian transgender girl in a hostile world. As an activist, counselor, conflict mediator, and spiritual healer, she's always pursued the same deeply personal mission: to embrace the revolutionary belief that every human being, no matter how hateful or horrible, is intrinsically sacred.But then Kai Cheng found herself in a crisis of faith, overwhelmed by the violence with which people treated one another, and barely clinging to the values and dreams she'd built her life around: justice, hope, love, and healing. Rather than succumb to despair and cynicism, she gathered all her rage and grief and took one last leap of faith: she wrote. She wrote letters that were prayers, or maybe poems, or perhaps magic spells. She wrote to the outcasts and runaways she calls her kin. She wrote to flawed but nonetheless lovable men, to people with good intentions who harm their own, to racists and transphobes seemingly beyond saving. What emerged was a blueprint for falling back in love with being human.Par Anthony Hecht. 2023
The New York Times Book Review Editors' Choice • In his centenary year, this volume of the Pulitzer Prize winner and…
former poet laureate&’s poems celebrates the indispensable artistry of a writer who faced the history of his era with a &“clear-eyed mercy toward human weakness&” (The New York Times Book Review) and was hailed in his day as &“the best poet writing in English&” (Joseph Brodsky).This volume brings together for the first time all of the poems that appeared in Anthony Hecht&’s seven trade collections, from A Summoning of Stones of 1954 through to The Darkness and the Light of 2001; it adds the remarkable work contained in his posthumously issued Interior Skies: Late Poems from Liguria of 2011; and it rounds this out with the best of the many poems which were left uncollected at the time of his death in 2004, the earliest dating from 1950 and the latest from 2001. Including the woodcuts by Leonard Baskin that accompanied some of his pieces through the years, Collected Poems brings us the full sweep of the experience and artistry of Anthony Hecht, who, as an infantryman in World War II, bore witness to the shaping events of his time, which continue to shape our own.As the editor Philip Hoy states in his introduction: &“Anthony Hecht once wrote that poems can allow us to contemplate our &‘sweetest triumphs&’ and our &‘deepest desolations,&’ and by employing &‘the manifold devices of art&’ to recover for us what he memorably called &‘the inexhaustible plenitude of the world.&’ The work gathered together here amply attests to the truth of that claim, and makes it clear that Hecht was one of the finest poets, not just of his generation, but of the twentieth century.&”Par Joy McCullough. 2023
&“At once tender, poetic and ferocious, Enter The Body breathes new life into the Bard&’s most tragic heroines. More than…
a tribute to Shakespeare, this kaleidoscopic, ambitious novel-in-verse gives Juliet, Ophelia, Cordelia, and Lavinia the chance to tell their own stories full of passion, justice, sisterhood, and love. Simply spectacular.&”—Michael L. Printz Award winner Laura Ruby, author of Bone GapIn the room beneath a stage's trapdoor, Shakespeare&’s dead teenage girls compare their experiences and retell the stories of their lives, their loves, and their fates in their own words. Bestselling author Joy McCullough offers a brilliant testament to how young women can support each other and reclaim their stories in the aftermath of trauma.Par Alicia Keys. 2004
From acclaimed musician Alicia Keys comes a revealing songbook of collected poems and lyrics that document her growth as a…
person, a woman, and an artist.&“All my life, I&’ve written these words with no thought or intention of sharing them. Not even with my confidants. These are my most delicate thoughts. The ones that I wrote down just so I could understand what in the world these things I was thinking meant...&” When she burst onto the music scene with her multi-million bestselling, Grammy® Award-winning first album, Songs in A Minor, Alicia Keys became a superstar. Two decades later, her career has expanded into producing, acting, and passionate activism—winning her worldwide acclaim, numerous awards, and a spot on Time&’s list of &“The 100 Most Influential People.&”Though Alicia has been very vocal through her career, there were always &“delicate thoughts&” that she never before imagined she&’d share with anyone else—until now. In Tears for Water, Alicia Keys opens the journals and notebooks that she has kept throughout her life and reveals her heart to her fans in return for all the love they have shown to her and her music.Hello morningnow I see youcause I am awakeWhat was once so sweet and securehas turned out to be fakeGirl, you can&’t be scaredgotta stand up tall and let &’em see what shines in youPush aside the partlying in your heartlike the ocean is deep, dark and blue—from Golden ChildPar Philip Whalen. 1999
Like his college roommate Gary Snyder, Philip Whalen took both poetry and Zen seriously. He became friends with Allen Ginsberg,…
Jack Kerouac, and Michael McClure, and played a key role in the explosive poetic revolution of the '50s and '60s. Celebrated for his wisdom and good humor, Whalen transformed the poem for a generation. His writing, taken as a whole, forms a monumental stream of consciousness (or, as Whalen calls it, "continuous nerve movie") of a wild, deeply read, and fiercely independent Americanone who refuses to belong, who celebrates and glorifies the small beauties to be found everywhere he looks. This long-awaited Selected Poems is a welcome opportunity to hear his influential voice again.Par Alice Notley. 1998
A Pulitzer Prize FinalistWinner of the Los Angeles Time Book PrizeAlice Notley vividly reconstructs the mysteries, longings, and emotions of…
her past in this brilliant collection of poems that charts her growth from young girl to young woman to accomplished artist. In this volume, memories of her childhood in the California desert spring to life through evocative renderings of the American landscape, circa 1950. Likewise, her coming of age as a poet in the turbulent sixties is evoked through the era's angry, creative energy. As she looks backward with the perspective that time and age allows, Notley ably captures the immediacy of youth's passion while offering her own dry-eyed interpretations of the events of a life lived close to the bone. Like the colorful collages she assembles from paper and other found materials, Notley erects structures of image and feeling to house the memories that swirl around her in the present.In their feverish, intelligent renderings of moments both precise and ephemeral, Notley's poems manage to mirror and transcend the times they evoke. Her profound tributes to the stages of her life and to the identities she has assumed—child, youth, lover, poet, wife, mother, friend, and widow—are remarkable for their insight and wisdom, and for the courage of their unblinking gaze.Par Mike Meyers, Travis A. Everett, Andrew Hutz. 2023
Fully Updated, Essential Skills for a Successful IT Career. Created and edited by the leading authority on CompTIA A+ certification…
and training, this four-color guide will help you pass CompTIA A+ exams 220-1101 and 220-1102 and become a certified IT professional with proven expertise in hardware and software. Mike Meyers’ CompTIA A+™ Guide to Managing and Troubleshooting PCs, Seventh Edition offers complete coverage of the latest exam objectives. You’ll get on-the-job tips, end-of-chapter review questions, and hundreds of photographs and illustrations.Par Tim Schlippe, Eric C. K. Cheng, Tianchong Wang. 2023
This book is a collection of selected research papers presented at the 2023 4th International Conference on Artificial Intelligence in…
Education Technology (AIET 2023), held in Berlin, Germany, on June 30 - July 2, 2023. AIET establishes a platform for AI in education researchers to present research, exchange innovative ideas, propose new models, as well as demonstrate advanced methodologies and novel systems. It is a timely and up-to-date publication responsive to the rapid development of AI technologies, practices and their increasingly complex interplay with the education domain. It promotes the cross-fertilisation of knowledge and ideas from researchers in various fields to construct the interdisciplinary research area of AI in Education. These subject areas include computer science, cognitive science, education, learning sciences, educational technology, psychology, philosophy, sociology, anthropology and linguistics. The feature of this book will contribute from diverse perspectives to form a dynamic picture of AI in Education. It also includes various domain-specific areas for which AI and other education technology systems have been designed or used in an attempt to address challenges and transform educational practice. This timely publication is in line with UNESCO’s Beijing Consensus on Artificial Intelligence and Education. It is committed to exploring how AI may play a role in bringing more innovative practices, transforming education, and triggering an exponential leap towards the achievement of the Education 2030 Agenda. Providing broad coverage of recent technology-driven advances and addressing a number of learning-centric themes, the book is an informative and useful resource for researchers, practitioners, education leaders and policy-makers who are involved or interested in AI and education.Computational fluid-structure interaction (FSI) and flow simulation are challenging research areas that bring solution and analysis to many classes of…
problems in science, engineering, and technology. Young investigators under the age of 40 are conducting much of the frontier research in these areas, some of which is highlighted in this volume. The first author of each chapter took the lead role in carrying out the research presented. Some of the topics explored includeDirect flow simulation of objects represented by point cloudsComputational investigation of leaflet flutter in thinner biological heart valve tissuesHigh-fidelity simulation of hydrokinetic energy applicationsHigh-resolution isogeometric analysis of car and tire aerodynamicsComputational analysis of air-blast-structure interactionHeart valve computational flow analysis with boundary layer and leaflet contact representationComputational thermal multi-phase flow for metal additive manufacturingThis volume will be a valuable resource for early-career researchers and students — not only those interested in computational FSI and flow simulation, but also other fields of engineering and science, including fluid mechanics, solid mechanics, and computational mathematics – as it will provide them with inspiration and guidance for conducting their own successful research. It will also be of interest to senior researchers looking to learn more about successful research led by those under 40 and possibly offer collaboration to these researchers.Par Jun Feng, Frank Jiang, Min Luo, Liang-Jie Zhang. 2024
This book constitutes the refereed proceedings of the 7th International Conference on Edge Computing, EDGE 2023, held in Shenzhen, China,…
during December 17–18, 2023. The 8 full papers in this book were carefully reviewed and selected from 14 submissions. They were organized in topical sections as follows: Practice of Edge Computing, identify emerging research topics, and define the future of Edge Computing.Par Álvaro Rocha, Carlos Ferrás, Waldo Ibarra. 2023
This book is composed by the papers written in English and accepted for presentation and discussion at The 2023 International…
Conference on Information Technology & Systems (ICITS'23), held at Universidad Nacional de San Antonio Abad del Cusco, in Cusco, Peru, between the 24th and the 26th of April 2023. ICIST is a global forum for researchers and practitioners to present and discuss recent findings and innovations, current trends, professional experiences and challenges of modern information technology and systems research, together with their technological development and applications. The main topics covered are: information and knowledge management; organizational models and information systems; software and systems modelling; software systems, architectures, applications and tools; multimedia systems and applications; computer networks, mobility and pervasive systems; intelligent and decision support systems; big data analytics and applications; human–computer interaction; ethics, computers & security; health informatics; information technologies in education, and Media, Applied Technology and Communication.This book constitutes the proceedings of the 6th International Conference on Applied Informatics, ICAI 2023, which took place in Guayaquil, Ecuador, in October…
2023.The 30 papers presented in this volume were carefully reviewed and selected from 132 submissions. The contributions are divided into the following thematic blocks: Artificial Intelligence; Data Analysis; Decision Systems; Enterprise Information Systems Applications; Geoinformatics; Health Care Information Systems; Interdisciplinary Information Studies; Learning Management Systems; Virtual and Augmented Reality.Par Cole Arthur Riley. 2024
In the summer of 2020, Cole Arthur Riley was desperate for a spirituality she could trust. Amidst ongoing national racial…
violence, the isolation of the pandemic, and a surge of anti-Black rhetoric in many Christian spaces, she began dreaming of a harbour for a more human, more liberating expression of faith. She went on to create Black Liturgies, a digital project that connects spiritual practice with Black emotion, memory, and the Black body.In this book, she deepens the work of that project, bringing together new prayers, letters, poetry, meditation questions, breath practice, and the writings of Black literary ancestors to offer 43 liturgies that can be practised individually or as a community. With a poet's touch and a sensitivity that has made her one of the most important spiritual voices at work today, Riley invites readers to reflect on their own experiences of wonder, rest, rage, and repair, while also including liturgies for holidays like Lent, Advent and Mother's Day.For those healing from spiritual spaces that were more violent than loving; for those who have escaped the trauma of white Christian nationalism, religious homophobia, and transphobia; for anyone asking what it means to be human in a world of both beauty and terror; Black Liturgies is a work of healing and liberation, and a vision for what might be.The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application…
of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.Par Bernd Bischl, Raphael Sonabend, Lars Kotthoff, Michel Lang. 2024
mlr3 is an award-winning ecosystem of R packages that have been developed to enable state-of-the-art machine learning capabilities in R.…
Applied Machine Learning Using mlr3 in R gives an overview of flexible and robust machine learning methods, with an emphasis on how to implement them using mlr3 in R. It covers various key topics, including basic machine learning tasks, such as building and evaluating a predictive model; hyperparameter tuning of machine learning approaches to obtain peak performance; building machine learning pipelines that perform complex operations such as pre-processing followed by modelling followed by aggregation of predictions; and extending the mlr3 ecosystem with custom learners, measures, or pipeline components. Features: In-depth coverage of the mlr3 ecosystem for users and developers Explanation and illustration of basic and advanced machine learning concepts Ready to use code samples that can be adapted by the user for their application Convenient and expressive machine learning pipelining enabling advanced modelling Coverage of topics that are often ignored in other machine learning books The book is primarily aimed at researchers, practitioners, and graduate students who use machine learning or who are interested in using it. It can be used as a textbook for an introductory or advanced machine learning class that uses R, as a reference for people who work with machine learning methods, and in industry for exploratory experiments in machine learning.Par Parul Dubey, Rohit Raja. 2024
Amazon Web Services (AWS) provides on-demand cloud computing platforms and application programming interfaces (APIs) to individuals, companies, and govern- ments,…
along with distributed computing processing capacity and software tools via AWS server farms. This text presents a hands-on approach for beginners to get started with Amazon Web Services (AWS) in a simple way. Key Features It discusses topics such as Amazon Elastic Compute Cloud, Elastic Load Balancing, Auto Scaling Groups, and Amazon Simple Storage Service. It showcases Amazon Web Services’ identity, access management resources, and attribute-based access control. It covers serverless computing services, Virtual Private Cloud, Amazon Aurora, and Amazon Comprehend. It explains Amazon Web Services Free Tier, Amazon Web Services Marketplace, and Amazon Elastic Container Service. It includes security in Amazon Web Services, the shared responsibilitymodel, and high-performance computing on Amazon Web Services. The text is primarily written for graduate students, professionals, and academic researchers working in the fields of computer science, engineering, and information technology. Parul Dubey is currently working as an Assistant professor in the Department of Artificial Intelligence at G H Raisoni College of Engineering, Nagpur, India. She has filed for 15 Indian patents. She is responsible for about 10 publications in conference proceedings, Scopus, and journals. She has contributed book chapters in an edited book published by CRC Press and other reputed publishers. She is also an AWS Certified Cloud Practitioner. Rohit Raja is working as an associate professor and head in the Department of Information Technology at Guru Ghasidas Vishwavidyalaya, Bilaspur, India. His research interests include facial recognition, signal processing, networking, and data mining. He has pub- lished 100 research papers in various international and national journals (including publications by the IEEE, Springer, etc.) and proceedings of reputed international and national conferences (again including publications by Springer and the IEEE).The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application…
of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application…
of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.