Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Captain Bligh's Portable Nightmare: From the Bounty to Safety?4,162 Miles across the Pacific in a Rowing Boat

Buy
At dawn on April 28, 1789, Captain William Bligh and eighteen men from HMS Bounty were herded onto a twenty-three-foot launch and abandoned in the middle of the Pacific Ocean. Thus began their extraordinary journey to Java. Covering 4,162 miles, the small boat was battered by continuous storms, and the men on board suffered crippling illness, near starvation, and attacks by islanders. The journey was one of the greatest achievements in the history of European seafaring and a personal triumph for a man who has been misjudged by history.
 
Captain Bligh's Portable Nightmare reveals Bligh's great mapmaking skills, used to particular effect while he was exploring with Captain Cook. We discover his guilt over Cook's death at Kealakekua Bay. We learn of the failure of the Bounty expedition and the myths that surround the mutiny led by Lieutenant Fletcher Christian, the trials and retributions that followed Bligh's return to England, his successes as a navigator and as a vice admiral fighting next to Nelson at the Battle of Copenhagen.


Combining extensive research with dazzling storytelling, John Toohey tells a gripping tale of seafaring, exploration, and mutiny on the high seas, while also dismissing the black legend of the cruel and foulmouthed Captain William Bligh and reinstating him not just as a man of his times but as a true hero.
(HTML tags aren't allowed.)

Implementing Cisco Unified Communications Manager, Part 2 (CIPT2) (Authorized Self-Study Guide)
Implementing Cisco Unified Communications Manager, Part 2 (CIPT2) (Authorized Self-Study Guide)
Professional certifications have been an important part of the computing industry for many years and will continue to become more important. Many reasons exist for these certifications, but the most popularly cited reason is that of credibility. All other considerations held equal, a certified employee/consultant/job candidate is considered more...
SQL Pocket Guide (Pocket Guides)
SQL Pocket Guide (Pocket Guides)

If you're a programmer or database administrator who uses SQL in your day-to-day work, this popular pocket guide is the ideal on-the-job reference. You'll find many examples that address the language's complexity, along with key aspects of SQL used in IBM DB2 Release 9.7, MySQL 5.1, Oracle Database 11g Release 2,...

Professional Java for Web Applications
Professional Java for Web Applications

The comprehensive Wrox guide for creating Java web applications for the enterprise

This guide shows Java software developers and software engineers how to build complex web applications in an enterprise environment. You'll begin with an introduction to the Java Enterprise Edition and the basic web application, then set...


Dreamweaver CS4 Digital Classroom
Dreamweaver CS4 Digital Classroom
Dreamweaver CS4 Digital Classroom is like having a personal instructor guiding readers through each lesson, while they work at their own pace. This book includes 13 self-paced lessons that let readers discover essential skills and explore new features and capabilities of Adobe Dreamweaver CS4. Each lesson is presented in full color with...
The Agile Pocket Guide: A Quick Start to Making Your Business Agile Using Scrum and Beyond
The Agile Pocket Guide: A Quick Start to Making Your Business Agile Using Scrum and Beyond

The Agile Pocket Guide explains how to develop products, services, and software quickly and efficiently, without losing the main components of the framework so effective in streamlining the creating of these products and for making positive change within a company. It includes

  • The basic tennets of the Scrum...
Network Security Tools : Writing, Hacking, and Modifying Security Tools
Network Security Tools : Writing, Hacking, and Modifying Security Tools
This concise, high-end guide shows experienced administrators how to customize and extend popular open source security tools such as Nikto, Ettercap, and Nessus. It also addresses port scanners, packet injectors, network sniffers, and web assessment tools. Network Security Tools is the one resource you want at your side when locking down your...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy