Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Encyclopedia of the Cold War: A Political, Social, and Military History, 5 Volume Set
The Encyclopedia of the Cold War: A Political, Social, and Military History, 5 Volume Set

A comprehensive five-volume reference on the defining conflict of the second half of the 20th century, covering all aspects of the Cold War as it influenced events around the world.

• 1,299 entries covering all facets of the Cold War from its origins to its aftermath, including all political, diplomatic, military,...

Posters: A Global History
Posters: A Global History
From band posters stapled to telephone poles to the advertisements hanging at bus shelters to the inspirational prints that adorn office walls, posters surround us everywhere―but do we know how they began? Telling the story of this ephemeral art form, Elizabeth E. Guffey reexamines the poster’s roots in the nineteenth century and...
Computer-Based Testing and the Internet: Issues and Advances
Computer-Based Testing and the Internet: Issues and Advances
We reside in various communities and live in one world. Although we may
reside in Beijing, China, on a kibbutz in Israel, or in Muleshoe, Texas, we are
aware of the impact of world events on our lives.

This has not always been true. Throughout most of history, life generally
was impacted by dominant qualities in
...
Theories of Programming and Formal Methods: Essays Dedicated to Jifeng He on the Occasion of His 70th Birthday (Lecture Notes in Computer Science)
Theories of Programming and Formal Methods: Essays Dedicated to Jifeng He on the Occasion of His 70th Birthday (Lecture Notes in Computer Science)

This Festschrift volume, dedicated to He Jifeng on the occasion of his 70th birthday in September 2013, includes 24 refereed papers by leading researchers, current and former colleagues, who congratulated at a celebratory symposium held in Shanghai, China, in the course of the 10th International Colloquium on Theoretical Aspects of Computing,...

The Power of Survey Design: A User's Guide for Managing Surveys, Interpreting Results, and Influencing Respondents
The Power of Survey Design: A User's Guide for Managing Surveys, Interpreting Results, and Influencing Respondents
Are you in favor of financial incentives for poor countries?" If this question were asked in a survey many would be inclined to agree. Yet the result of this poll would be different if the question asked was "Are you in favor of subsidies for poor countries?" This is a simple example of how one single word, incentives or subsidies,...
Unifying Theories of Programming and Formal Engineering Methods: International Training School on Software Engineering, Held at ICTAC 2013, Shanghai, ... Lectures (Lecture Notes in Computer Science)
Unifying Theories of Programming and Formal Engineering Methods: International Training School on Software Engineering, Held at ICTAC 2013, Shanghai, ... Lectures (Lecture Notes in Computer Science)

This book presents 5 tutorial lectures by leading researchers given at the ICTAC 2013 Software Engineering School on Unifying Theories of Programming and Formal Engineering Methods, held in Shanghai, China in August 2013.The lectures are aimed at postgraduate students, researchers, academics, and industrial engineers. They cover topics such...

Outsourcing America: What's Behind Our National Crisis and How We Can Reclaim American Jobs
Outsourcing America: What's Behind Our National Crisis and How We Can Reclaim American Jobs

"Foreword by Lou Dobbs One of the hottest, most controversial topics in the news is the outsourcing of American jobs to other countries. Outsourced jobs are extending well beyond the manufacturing sector to include white-collar professionals, particularly in information technology, financial services, and customer service....

PC Magazine January 2006
PC Magazine January 2006
Articles in January 2006 issue of PC Magazine

    * US High Court Refuses to Review RIM Patent Ruling
      by Reuters  
    * DTV Alliance Takes Mobile TV To The Masses
      by Bary Alyssa Johnson
    * Government
...
Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)
Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)

Conquering cyber attacks requires a multi-sector, multi-modalapproach

Cyber Threat! How to Manage the Growing Risk of CyberAttacks is an in-depth examination of the very real cybersecurity risks facing all facets of government and industry, andthe various factors that must align to maintain informationintegrity....

Taoism For Dummies
Taoism For Dummies

The definitive guide to understanding Taoism—no matter your background or faith

Lao Tzu's Tao Te Ching is the second most translated book in the world, and the practice of religious Taoism is on the rise in China, where adherents currently number in the hundreds of millions. Yet there remains a remarkable...

Software Architecture (Advanced Topics in Science and Technology in China)
Software Architecture (Advanced Topics in Science and Technology in China)
Part of the new series, Advanced Topics in Science and Technology in China, this book aims to introduce the theoretical foundations, various sub-fields, current research, and practical methods of software architecture. Readers can acquire basic knowledge of software architecture, including why software architecture is necessary, how we can describe...
Cardiovascular Disease, Volume 2: Molecular Medicine (Methods in Molecular Medicine)
Cardiovascular Disease, Volume 2: Molecular Medicine (Methods in Molecular Medicine)

Cardiovascular disease is the leading cause of death in developed countries, but is quickly becoming an epidemic in such well-populated countries as China, India, and other developing nations. Cardiovascular research is the key to the prevention, diagnosis, and management of cardiovascular disease. Vigorous and cross-disciplinary approaches...

Result Page: 27 26 25 24 23 22 21 20 19 18 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy