 |
|
 Welfare And Work: Experiences In Six CitiesKing and Mueser examine changes in welfare participation and labor market involvement of welfare recipients in six major cities during the 1990s. By focusing on these six cities (Atlanta, Baltimore, Chicago, Fort Lauderdale, Houston, and Kansas City) they are able to glean the extent to which differences in state and local policy, administrative... |  |  Controlling Cholesterol For Dummies (Health & Fitness)
"the authors...know their stuff...the book is a fairly painless way to learn more about subjects you might rather avoid." -- Chicago Tribune, December 1, 2002
Need to get your cholesterol in check? You’ll find the latest information about cholesterol, including treatments, drug information, and... |  |  AdvancED Flex 3Whether you're a Flex 3 beginner or intermediate user, this book provides the necessary information to help you develop into an expert. Using a practical hands-on approach, it illustrates exactly how to create robust and scalable enterprise-grade Rich Internet Applications (RIAs).
The book is divided into three parts. The first part discusses... |
|
 |  |  Railroad Vehicle Dynamics: A Computational ApproachThe methods of computational mechanics have been used extensively in modeling many physical systems. The use of multibody-system techniques, in particular, has been applied successfully in the study of various, fundamentally different applications. Railroad Vehicle Dynamics: A Computational Approach presents a computational multibody-system... |  |  One Jump Ahead: Computer Perfection at CheckersThe new edition of this extraordinary book depicts the creation of the world champion checkers computer program, Chinook. In only two years, Chinook had become a worthy opponent to the world champion, and within four years had defeated all the world's top human players. Jonathan Schaeffer, the originator and leader of the Chinook team, details the... |
|
 Forensic Neuropathology, Second EditionThis updated text comprehensively reviews all aspects of neuropathology that may have forensic or medical-legal import. The book presents significant coverage of the role of the neuropathologist in a legal setting before delving into specific forensic aspects of neuropathology, including comprehensive discussions of various syndromes and conditions... |  |  How to Be a People Magnet : Finding Friends--and Lovers--and Keeping Them for LifeSome folks are human magnets. People smile at them wherever they go. They have faithful friends who would do anything for them. They get invited to all the parties. They have more dates than they can handle. What's their secret? According to bestselling author Leil Lowndes, beloved and popular people know the secret of fearless communicating . . .... |  |  grep Pocket Referencegrep Pocket Reference is the first guide devoted to grep, the powerful utility program that helps you locate content in any file on a Unix or Linux system. Several applications use grep, from mail filtering and system log management to malware analysis and application development, and there are many other ways to use the utility. This pocket... |
|
 The Complete Idiot's Guide to Managing Your MoneyThe Complete Idiot's Guide to Managing Your Money shows that any numbskull can master personal finance. In this second edition, a father-and-daughter writing team, Robert K. Heady and Christy Heady, give readers the best advice culled from their many years of experience in consumer rights and money management. The Headys believe that... |  |  Head First Web Design (A Brain Friendly Guide)Want to know how to make your pages look beautiful, communicate your message effectively, guide visitors through your website with ease, and get everything approved by the accessibility and usability police at the same time? Head First Web Design is your ticket to mastering all of these complex topics, and understanding what's really going... |  |  Post Quantum CryptographyQuantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature... |
|
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |