|
|
|
|
| | Drug Use for Grown-Ups: Chasing Liberty in the Land of Fear
“Hart’s argument that we need to drastically revise our current view of illegal drugs is both powerful and timely . . . when it comes to the legacy of this country’s war on drugs, we should all share his outrage.” —The New York Times Book Review
From one of the world's... | | |
|
Premiere Elements for Windows (Visual QuickStart Guide)Just because you don't work for a major production house and you don't plan to add Star Wars style special effects to your latest movie project doesn't mean you don't want to do interesting things with the video you've shot. Now, with Adobe's first consumer-level video editing software you can-and at $99, you won't spend an arm and a leg to do so!... | | Professional Java JDK 6 EditionWorking as an effective professional Java developer requires you to know Java APIs, tools, and techniques to solve a wide variety of Java problems. Building upon Ivor Horton's Beginning Java 2, this resource shows you how to use the core features of the latest JDK as well as powerful open source tools such as Ant, JUnit, and Hibernate. It... | | |
|
MBA In A Day: What You Would Learn At Top-Tier Business Schools
Praise for MBA IN A DAY®
"Dr. Stralser’s book, MBA in a Day is must reading for every physician who is in a management role, anticipates management responsibilities, or functions in a private, solo, or group practice setting. Insights into the fundamentals of management, marketing, personnel management, finance, and... | | Going off the Rails: Global Capital and the Crisis of LegitimacyIn this thought-provoking work, writer and journalist John Plender explores the model of capitalism advocated by English-speaking countries and asks the following pertinent questions:
- Why are developing countries financing the world's richest economy, instead of the other way round?
- How have the markets come
... | | Android Security Cookbook
Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
Overview
-
Analyze the security of Android applications and devices, and exploit common vulnerabilities in applications and Android operating systems
... |
|
|
|
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 |