Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Guarantee of Peace: The League of Nations in British Policy 1914-1925
Guarantee of Peace: The League of Nations in British Policy 1914-1925

Peter Yearwood reconsiders the League of Nations, not as an attempt to realize an idea but as an element in the day-to-day conduct of Britain's foreign policy and domestic politics during the period 1914-25.

He challenges the usual view that London reluctantly adopted the idea in response to pressure from Woodrow Wilson
...

Modern Business Process Automation: YAWL and its Support Environment
Modern Business Process Automation: YAWL and its Support Environment
The held of Business Process Management (BPM) is marred by a seemingly end- less sequence of (proposed) industry standards. Contrary to other fields (e.g.. civil or electronic engineering), these standards are not the result of a v\ idelj supported consolidation of well-understood and well-established concepts and practices. In the...
Java How to Program: Late Objects Version (8th Edition)
Java How to Program: Late Objects Version (8th Edition)
Welcome to the Java programming language and Java How to Program, Late Objects Version, Eighth Edition! This book is appropriate for introductory-level programming courses (commonly known as CS1 and CS2). It also provides substantial depth for those who already know how to program and want to learn Java.

The Deitels’...

Methods and Procedures for Building Sustainable Farming Systems: Application in the European Context
Methods and Procedures for Building Sustainable Farming Systems: Application in the European Context

Showing how the method of sustainability assessment plays a key role in choosing the best agricultural productive mode, this book guides the reader through the process of selecting, from among the various approaches for building farming systems, the method of decision-making that will result in the most appropriate outcome, given the context....

Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
Windows NT Win32 API SuperBible (Other Sams)
Windows NT Win32 API SuperBible (Other Sams)
Windows NT Win32 API SuperBible is the perfect resource for programmers who want comprehensive, updated coverage of all Win32 APIs, as well as detailed information specific to the newest Windows NT functions. This book lets you look up the specific Win32 API call you need, when you need it. Concise descriptions detail what you need to know about...
Software Design (2nd Edition)
Software Design (2nd Edition)
Software design is a multi-disciplinary activity that develops tools through effective communication of ideas and the use of engineering practices. This text provides an overview and perspective of software design within the context of software development and also of more general thinking about design issues. It examines the nature of design...
Augmented Learning: Research and Design of Mobile Educational Games
Augmented Learning: Research and Design of Mobile Educational Games
New technology has brought with it new tools for learning, and research has shown that the educational potential of video games resonates with scholars, teachers, and students alike. In Augmented Learning, Eric Klopfer describes the largely untapped potential of mobile learning games--games played on such handheld devices as cell phones,...
Rapid Chemical and Biological Techniques for Water Monitoring (Water Quality Measurements)
Rapid Chemical and Biological Techniques for Water Monitoring (Water Quality Measurements)
Rapid Chemical and Biological Techniques for Water Monitoring presents in one volume the broad spectrum of monitoring tools, both available and under development, and provides an assessment of their potential for underpinning environmental management and legislation. The book explores screening methods in the context of water policies;...
The Architecture of Computer Hardware, Systems Software, & Networking: An Information Technology Approach
The Architecture of Computer Hardware, Systems Software, & Networking: An Information Technology Approach

The modern world offers lots of readily available online resources for learning. Wikipedia, Google, news sources, millions of Web sites and blogs, even YouTube, offer access to information in nearly any subject that triggers your curiosity and interest. Nonetheless, I continue to believe that for deep understanding of something, nothing...

Brain Damage and Repair: From Molecular Research to Clinical Therapy
Brain Damage and Repair: From Molecular Research to Clinical Therapy

This book builds a novel bridge from molecular research to clinical therapy. This approach reveals the functional features of neurons and glia in the particular context of vulnerability and self-protection, intracellular properties and extracellular matrix. Arising from this platform, this volume unfolds the molecular and systemic processes...

Going Wi-Fi: A Practical Guide to Planning and Building an 802.11 Network
Going Wi-Fi: A Practical Guide to Planning and Building an 802.11 Network

Make informed decisions about planning and installing 802.11 “Wi-Fi” wireless networks. This book helps you tackle the challenge, whether installing Wi-Fi within an existing corporate network, or setting up a wireless network from scratch in any business or organization. Author Janice Reynolds guides you through everything you need...

unlimited object storage image
Result Page: 156 155 154 153 152 151 150 149 148 147 146 145 144 143 142 141 140 139 138 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy