Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Biased: Uncovering the Hidden Prejudice That Shapes What We See, Think, and Do
Biased: Uncovering the Hidden Prejudice That Shapes What We See, Think, and Do
"A fascinating new book... [Dr. Jennifer Eberhardt is] a genius."—Trevor Noah, The Daily Show with Trevor Noah

"Poignant....important and illuminating."—The New York Times Book Review

"Groundbreaking."—Bryan Stevenson, New York Times
...
Programming Visual Basic for the Palm OS (O'Reilly Palm)
Programming Visual Basic for the Palm OS (O'Reilly Palm)

This book provides comprehensive coverage of software application development for the Palm, using the Visual Basic (VB) language. In this book, we'll illustrate Palm development using a variety of software techniques, but we'll focus on a new Visual Basic compiler for the Palm: the AppForge Add-in for Microsoft Visual Basic....

Programming Microsoft ASP.NET MVC
Programming Microsoft ASP.NET MVC
Until late 2008, I was happy enough with Web Forms. I did recognize its weak points and could nicely work around them with discipline and systematic application of design principles. But a new thing called ASP.NET MVC was receiving enthusiastic reviews by a growing subset of the ASP.NET community. So I started to...
Sams Teach Yourself HTML, CSS, and JavaScript All in One
Sams Teach Yourself HTML, CSS, and JavaScript All in One

Before learning the intricacies of HTML (Hypertext Markup Language), CSS (Cascading Style Sheets), and JavaScript, it is important that you gain a solid understanding of the technologies that help transform these plaintext files to the rich multimedia displays you see on your computer or handheld device when browsing the World Wide Web. For...

Probability Theory: A Comprehensive Course (Universitext)
Probability Theory: A Comprehensive Course (Universitext)

This second edition of the popular textbook contains a comprehensive course in modern probability theory. Overall, probabilistic concepts play an increasingly important role in mathematics, physics, biology, financial engineering and computer science. They help us in understanding magnetism, amorphous media, genetic diversity and the perils...

Computer and Information Security Handbook
Computer and Information Security Handbook

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical...

The Wiley Handbook of Problem-Based Learning (Wiley Handbooks in Education)
The Wiley Handbook of Problem-Based Learning (Wiley Handbooks in Education)

The first book to offer an in-depth exploration of the topic of problem-based learning with contributions from international experts

The Wiley Handbook of Problem-Based Learning is the first book of its kind to present a collection of original essays that integrate the research and practice of...

Professional InfoPath 2003
Professional InfoPath 2003
Microsoft InfoPath 2003 helps developers tackle forms-based information-gathering with the full range of XML technologies. This book quickly guides experienced Office and XML developers through InfoPath fundamentals, including XML form templates architecture, form definition file structure, available external data sources, and backend services....
DHCP for Windows 2000
DHCP for Windows 2000
Dynamic Host Configuration Protocol (DHCP) provides a means of allocating and managing IP addresses dynamically over a network. Before the advent of DHCP, administrators configured each host on a network with an IP address, subnet mask, and default gateway. Maintaining the changes and the logs of the changes took a tremendous amount of time and was...
Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication
Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication
"Counterterrorism is an important research area for national security and defense, and an area where statisticians can provide insights and tools to improve the standard practice. As funding and governmental interest in these areas continues to grow, this book will provide a stepping stone for those interested in this emerging area of...
Fundamentals of Air Pollution, Fourth Edition
Fundamentals of Air Pollution, Fourth Edition
A compendium for all involved directly or indirectly in decision making about air pollution control-regulatory or engineering.

Fundamentals of Air Pollution is an important and widely used textbook in the environmental science and engineering community. Written shortly after the passage of the seminal Clean Air Act
...
Pen-and-Paper User Interfaces: Integrating Printed and Digital Documents (Human-Computer Interaction Series)
Pen-and-Paper User Interfaces: Integrating Printed and Digital Documents (Human-Computer Interaction Series)

Even at the beginning of the 21st century, we are far from becoming paperless. Pen and paper is still the only truly ubiquitous information processing technology. Pen-and-paper user interfaces bridge the gap between paper and the digital world. Rather than replacing paper with electronic media, they seamlessly integrate both worlds in a...

unlimited object storage image
Result Page: 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy