Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Republic of Lies: American Conspiracy Theorists and Their Surprising Rise to Power
Republic of Lies: American Conspiracy Theorists and Their Surprising Rise to Power

A riveting tour through the landscape and meaning of modern conspiracy theories, exploring the causes and tenacity of this American malady, from Birthers to Pizzagate and beyond.

American society has always been fertile ground for conspiracy theories, but with the election of Donald Trump, previously
...

Handbook of Multisensor Data Fusion: Theory and Practice, Second Edition (Electrical Engineering and Applied Signal Processing)
Handbook of Multisensor Data Fusion: Theory and Practice, Second Edition (Electrical Engineering and Applied Signal Processing)
In the years since the bestselling first edition, fusion research and applications have adapted to service-oriented architectures and pushed the boundaries of situational modeling in human behavior, expanding into fields such as chemical and biological sensing, crisis management, and intelligent buildings.

Handbook of Multisensor Data...

Mastering Python Regular Expressions
Mastering Python Regular Expressions

For Python developers, this concise and down-to-earth guide to regular expressions is all you need to gain vital new knowledge. From a theoretical overview to Python specifics, it explains everything in crystal clear language.

Overview

  • Explore the workings of Regular Expressions in Python
  • ...
Camera Networks: The Acquisition and Analysis of Videos over Wide Areas (Synthesis Lectures on Computer Vision)
Camera Networks: The Acquisition and Analysis of Videos over Wide Areas (Synthesis Lectures on Computer Vision)
Camera networks is a highly interdisciplinary area of research that has been very active over the last few years. In this book, we focus specifically on the topic of video understanding in camera networks and touch upon the other related areas (e.g., communication resources, machine learning, cooperative control of multi-agent...
Professional Microsoft SQL Server 2012 Integration Services
Professional Microsoft SQL Server 2012 Integration Services

THE MOST IMPORTANT BUSINESS intelligence tool in the Microsoft Swiss Army knife of tools is SQL Server Integration Services (SSIS). This is because the other tools would be nothing without the cleansing and movement of data into a presentable format. The product can extract, transform, and load (ETL) data astonishingly fast. A 2010 benchmark...

Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

The Polar Bear Expedition: The Heroes of America's Forgotten Invasion of Russia, 1918-1919
The Polar Bear Expedition: The Heroes of America's Forgotten Invasion of Russia, 1918-1919

In the brutally cold winter of 1919, 5,000 Americans battled the Red Army 600 miles north of Moscow. We have forgotten. Russia has not.

"AN EXCELLENT BOOK." —Wall Street Journal • "INCREDIBLE." — John U. Bacon •...

World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing
World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing

"Richard Hunter has seen the future, and its really scary. If you ever plan to do anything wrong, you need to read this book. If you suspect that someone will ever try to do anything wrong to you, you also need to read it. I believe that covers pretty much all of us." —Thomas H. Davenport, Director, Accenture Institute for...

Preparing for the Worst: A Comprehensive Guide to Protecting Your Family from Terrorist Attacks, Natural Disasters, and Other Catastrophes
Preparing for the Worst: A Comprehensive Guide to Protecting Your Family from Terrorist Attacks, Natural Disasters, and Other Catastrophes

Preparing for the Worst details the best practices in antiterrorism tactics and preparing for disaster. This book is for typical American families, business travelers, corporate executive management personnel, emergency first responders, school administrators, and local government officials responsible for public safety and emergency...

The Fifth Postulate: How Unraveling A Two Thousand Year Old Mystery Unraveled the Universe
The Fifth Postulate: How Unraveling A Two Thousand Year Old Mystery Unraveled the Universe
What do Einstein's theory of relativity, string theory, and lots of other mind-bending—and space-bending—revelations of modern physics have in common? None of them could have been discovered until scientists and mathematicians recognized an uncomfortable truth—that there was a reason the world's greatest mathematical minds had...
Persuasive Technology: Using Computers to Change What We Think and Do (The Morgan Kaufmann Series in Interactive Technologies)
Persuasive Technology: Using Computers to Change What We Think and Do (The Morgan Kaufmann Series in Interactive Technologies)
With compelling insights and illuminating examples, the author reveals how Web sites, software applications, and mobile devices can be used to change people’s attitudes and behavior.

Can computers change what you think and do? Can they motivate you to stop smoking, persuade you to buy insurance, or convince you to join the Army?

...
Nonprofit Essentials: Managing Technology
Nonprofit Essentials: Managing Technology

This book is intended to help nonprofit leaders become not only more effective as
administrators, marketers, researchers, and fundraisers, but also more responsible custodians
of limited funds.When every penny counts, computers can help to make it
possible for small, committed groups to perform the routine tasks that once...

Result Page: 11 10 9 8 7 6 5 4 3 2 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy