This volume clearly outlines the methods used to study population structure and change by presenting the major descriptive and analytical models developed by demographers to investigate the interrelat
In Search for Security, M. J. Field offers a unique ethno-psychiatric study of rural Ghana. The book focuses on the people, many of whom were obviously mentally ill, who came to the shrines of a new r
Concise, easy-to-read book explains why and how horses behave the way they do. It describes methods by which behavior problems can be PREVENTED, and methods which can be used to correct existing probl
Leverage Elasticsearch to create a robust, fast, and flexible search solution with easeAbout This BookBoost the searching capabilities of your system through synonyms, multilingual data handling, nest
"In this retelling of the classic Brothers Grimm tale, five-year-old Hansel, who has Down syndrome, is in search of food for his family. His compassion upon completing the quest frees the witch from a
This book is for programmers, scientists, and engineers who have knowledge of the Python language and know the basics of data science. It is for those who wish to learn different data analysis methods
Effortless English: Learn To Speak English Like A NativeA.J. HOGE, THE WORLD'S #1 ENGLISH TEACHER, teaches you his most powerful methods for learning to speak English fluently and confidently. Famous
This book is an easy-to-follow guide, full of hands-on, real-world examples. Each topic is explained and demonstrated in a specific and user-friendly flow, from search optimization using Solr to Deplo
This book is full of step-by-step example-oriented tutorials which will show readers how to integrate Solr in PHP applications using the available libraries, and boost the inherent search facilities t
The book adopts a tutorial-based approach to introduce the user to Scikit-learn. If you are a programmer who wants to explore machine learning and data-based methods to build intelligent applications
"Web Penetration Testing with Kali Linux" contains various penetration testing methods using BackTrack that will be used by the reader. It contains clear step-by-step instructions with lot of screensh
"Apache Solr 4 Cookbook" is written in a helpful, practical style with numerous hands-on recipes to help you master Apache Solr to get more precise search results and analysis, higher performance, and
Quaternary Sediments: Petrographic Methods for the Study of Unlithified Rocks (Second Edition), first published in 1991, deals with the analysis of sediments, soils and weathering products to reconstr
Shapeshifter Dagger comes face-to-face with his past in the form of an intruder who first wants to hire him, then tries to kill him. The search leads to a technologically advanced city below the surfa
Johann Georg Hohman's Long Lost Friend compiled practical uses of mysterious folk magic and rural home remedies rooted in medieval Europe. First published in America in 1820, these methods derive from
How are forensic investigations conducted? What are the latest techniques in forensic methods? This book provides a comprehensive resource for the study of forensic science and its approaches to the i
With the needs of the environment and the movement toward sustainability ever in mind, designers and managers of projects find themselves needing more quantitative and qualitative methods and techniqu
Interviews with Capote cover his writing methods, his observations on the wealthy, his outlook on life, and his feelings about the writers who influenced his work
From the Seminar on Theological Perspectives on the Book of Ezekiel, which meets at each annual meeting of the Society, 12 essays and two responses representing a range of perspectives and methods exp
The co-authors of Freedom from Fear offers comprehensive biblical principles and constructive methods of controlling anger, covering such topics as recognizing righteous anger, avoiding destructive an