Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The God Part of the Brain: A Scientific Interpretation of Human Spirituality and God
The God Part of the Brain: A Scientific Interpretation of Human Spirituality and God

Acclaimed by a wide range of experts, The "God" Part of the Brain is a classic. Matthew Alper presents a stunning argument: that our brain is hardwired to believe in a God. He offers a scientific explanation that we inherit an evolutionary mechanism that allows us to cope with our greatest terror - death.

The author also...

Exploring Data with RapidMiner
Exploring Data with RapidMiner

RapidMiner is a highly versatile tool that can make data work harder for you. This book will show you how to import, parse, and structure your data with remarkable speed and efficiency. It's data mining made accessible.

Overview

  • See how to import, parse, and structure your data quickly and...
Bint Al-Huda Collection: All Novels and Short Stories
Bint Al-Huda Collection: All Novels and Short Stories
Bint al-Huda Collection includes all the 4 novels and 24 short stories written by Martyr Aminah Haider Al-Sadr, the famous Muslim author popularly known as Bint Al-Huda. She played a significant role in creating Islamic awareness among the Muslim women of Iraq from the late 1950s to 1980. She was the sister of the great Islamic scholar,...
Designing Inclusive Interactions: Inclusive Interactions Between People and Products in Their Contexts of Use
Designing Inclusive Interactions: Inclusive Interactions Between People and Products in Their Contexts of Use

Designing Inclusive Interactions contains the proceedings of the fifth Cambridge Workshop on Universal Access and Assistive Technology (CWUAAT), incorporating the 8th Cambridge Workshop on Rehabilitation Robotics, held in Cambridge, England, in March 2010. It contains contributions from an international group of leading...

Information Security Fundamentals
Information Security Fundamentals

The purpose of information security is to protect an organization’s valuable resources, such as information, computer hardware, and software. Through the selection and application of appropriate safeguards, security helps the organization’s mission by protecting its physical and financial resources, reputation, legal position,...

Beyond the Brand : Why Engaging the Right Customers is Essential to Winning in Business
Beyond the Brand : Why Engaging the Right Customers is Essential to Winning in Business

Branding reached its zenith in the dot-com era, when as much as 90 percent of the venture capital raised by start-ups was budgeted simply to establish corporate identity and earn a spot in the public’s awareness. Since then, however, it’s become increasingly clear that companies were approaching things backwards. And so the time has...

Pro ASP.NET MVC Framework
Pro ASP.NET MVC Framework

Steven Sanderson has seen the ASP.NET MVC framework mature from the start, so his experience, combined with comprehensive coverage of all the new features, including those in the official MVC development toolkit, offers the clearest understanding of how this exciting new framework could improve your coding...

LinkedIn for Business: How Advertisers, Marketers and Salespeople Get Leads, Sales and Profits from LinkedIn (Que Biz-Tech)
LinkedIn for Business: How Advertisers, Marketers and Salespeople Get Leads, Sales and Profits from LinkedIn (Que Biz-Tech)

Increase Your LinkedIn Leads, Sales, and Profits: Attract Higher-Quality Leads, Market More Effectively, Boost Your Sales
This book delivers a complete system for profiting from LinkedIn. Top social media marketer Brian Carter shows you how to use LinkedIn to supercharge your existing business-to-business marketing,
...

Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures
Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures
Today's headlines are littered with news of identity thieves, organized cyber criminals, corporate espionage, nation-state threats and even terrorists. They represent the next wave of security threats but still possess nowhere near the devastating potential of the most insidious threat: the insider. This is not the bored 16 year-old hacker. We are...
Web Engineering Advancements and Trends: Building New Dimensions of Information Technology (Premier Reference Source)
Web Engineering Advancements and Trends: Building New Dimensions of Information Technology (Premier Reference Source)

As countless failures in information technology and Web-based systems are caused by an incorrect understanding of knowledge sharing, an increased awareness of modern, fundamental industry concepts becomes crucial to Web and interface developers.

Web Engineering Advancements and Trends: Building New Dimensions of Information...

Data Mining Applications for Empowering Knowledge Societies
Data Mining Applications for Empowering Knowledge Societies
Data Mining techniques are gradually becoming essential components of corporate intelligence systems and progressively evolving into a pervasive technology within activities that range from the utilization of historical data to predicting the success of an awareness campaign. In reality, data mining is becoming an interdisciplinary field driven by...
The Encyclopedia of Sleep and Sleep Disorders, Second Edition
The Encyclopedia of Sleep and Sleep Disorders, Second Edition

Millions of people have experienced sleeprelated concerns, and millions more suffer from serious sleeping disorders. The lack of proper rest can lead to fatigue at work, affect alertness while driving as well as other serious physical and mental health problems. Written for both the lay reader and the professional, The Encyclopedia of Sleep and...

unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy