Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Birth of Satan: Tracing the Devil's Biblical Roots
The Birth of Satan: Tracing the Devil's Biblical Roots
"An informative study of the biblical origins of Satan…With resourceful though never excessive citation, Mobley and Wray make a good job of pinning down the roots of a notoriously protean character."--The Times Literary Supplement

"Let's admit it. Even in a secular age we are all still
...
The Encyclopedia of Demons and Demonology
The Encyclopedia of Demons and Demonology

The conflict between good and evil can be found in every culture, mythical tradition, and religion throughout history. In many cases, the source of evil has been personified as demons or devils, and in many belief systems, both are considered to be real entities operating outside the boundaries of the physical world to torment people or lead...

Google Speaks: Secrets of the World's Greatest Billionaire Entrepreneurs, Sergey Brin and Larry Page
Google Speaks: Secrets of the World's Greatest Billionaire Entrepreneurs, Sergey Brin and Larry Page
In many ways, Google is the prototype of a successful twenty-first-century company. It uses technology in new ways to make information universally accessible; promotes a corporate culture that encourages creativity among its employees; and takes its role as a corporate citizen very seriously, investing in green initiatives and developing the...
The Hammer of Witches: A Complete Translation of the Malleus Maleficarum
The Hammer of Witches: A Complete Translation of the Malleus Maleficarum
The Malleus Maleficarum, first published in 1486-7, is the standard medieval text on witchcraft and it remained in print throughout the early modern period. Its descriptions of the evil acts of witches and the ways to exterminate them continue to contribute to our knowledge of early modern law, religion and society. Mackay's highly acclaimed...
Managed Code Rootkits: Hooking into Runtime Environments
Managed Code Rootkits: Hooking into Runtime Environments

We live in a world in which we can’t trust our computers. For example, how can we know for sure that our hardware manufacturer did not hide malicious code in the system’s microchip? Or that our freshly installed operating system does not contain backdoors created by a rogue developer from the OS development team?

...

Law of Financial Success
Law of Financial Success
1907. Contents: Money; Mental attitude; Fear and worry; Faith; Latent powers; Ambition; Desire; Will power; Auto-suggestion; Harmony; Creation; Concentration; Persistence; Habit; Claiming your own; Making money.

There is no idea that seems so much misunderstood as this idea of "Money." On the one hand we find many
...
Programming and Customizing the PIC Microcontroller (Tab Electronics)
Programming and Customizing the PIC Microcontroller (Tab Electronics)
For complete, practical insight into the chip that is quickly becoming the microcontroller of choice throughout the world. The use of Microchip's PIC family of microcontrollers is growing rapidly worldwide. This tutorial/disk package is unique in providing you with a complete understanding of the PIC chip and all the information needed to design...
Invasion of Privacy!  Big Brother and the Company Hackers
Invasion of Privacy! Big Brother and the Company Hackers

Pop-up ads, cookies, spyware, spam, junk mail, telemarketing calls. Rapidly evolving technology has made you a target and your personal information a desirable commodity. Your profile is out there and it’s available not just to the highest bidder, but to every bidder. Technology, advertising, the media, and government have converged to...

101 Spy Gadgets for the Evil Genius
101 Spy Gadgets for the Evil Genius
101 SPY DEVICES FOR SERIOUS SNOOPING

This book offers an amazingly awesome and complete collection of professional spy tools that you can build yourself. You can build any project in this thrilling arsenal of spy devices for $30 or less! Not only that, even total beginners to electronics can construct these mind-boggling...

The Adventures of Tintin in the Land of the Soviets
The Adventures of Tintin in the Land of the Soviets

This new facsimile reprint of the very first adventure of one of the world's most beloved cartoon characters shows Tintin's creator, the famed Belgian cartoonist Herge, just beginning to learn his craft. The story was originally created in 1929 for a children's supplement in the Belgian newspaper Le Vingtieme Siecle. Readers meet Tintin,...

Evil by Design: Interaction Design To Lead Us Into Temptation
Evil by Design: Interaction Design To Lead Us Into Temptation

Learn how companies make us feel good about doing what they want. Approaching persuasive design from the dark side, this book melds psychology, marketing, and design concepts to show why we're susceptible to certain persuasive techniques. Packed with examples from every nook and cranny of the web, it provides easily digestible and...

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

unlimited object storage image
Result Page: 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy