Home | Amazing | Today | Tags | Publishers | Years | Search 
Dark Reunion (Vampire Diaries, No 4)
Dark Reunion (Vampire Diaries, No 4)

The Final Conflict...The Last Deadly Kiss

Elena
Now she rises from the dead to recreate the powerful vampire trio.

Stefan
Summoned by Elena, he keeps a promise to her and fights the most terrifying evil he's ever faced.

Damon
Joining the brother he once called enemy, Damon battles this new
...

The Adventures of Tintin in the Land of the Soviets
The Adventures of Tintin in the Land of the Soviets

This new facsimile reprint of the very first adventure of one of the world's most beloved cartoon characters shows Tintin's creator, the famed Belgian cartoonist Herge, just beginning to learn his craft. The story was originally created in 1929 for a children's supplement in the Belgian newspaper Le Vingtieme Siecle. Readers meet Tintin,...

Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)
Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)

Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your...

Dissecting the Holocaust: The Growing Critique of Truth and Memory
Dissecting the Holocaust: The Growing Critique of Truth and Memory

Historical revisionism is the great intellectual adventure of the end of the 20th century.

Despite its size, the present handbook offers only a glimpse of that adventure; and so it seems necessary here first to specify the precise historical problem upon which the Revisionists have concentrated their research, then how revisionism...

America's Other War: Terrorizing Colombia
America's Other War: Terrorizing Colombia
This controversial book maintains that in Colombia the US has long supported a pervasive campaign of state violence directed against both armed insurgents and a wide range of unarmed progressive social forces. While the context may change from one decade to the next, the basic policies remain the same: maintain the pro-US Colombian...
The Superhero Book
The Superhero Book
Modern mythology leaps into the popular culture from the pages of comic books and now propels the astounding growth of the graphic novel. Aimed at the genesis, The Superhero Book is the ultimate A-to-Z compendium of everyone’s favorite overachievers in the pitched battle between good and evil. With 300 entries examining more...
The Living Cosmos: Our Search for Life in the Universe
The Living Cosmos: Our Search for Life in the Universe

Astrobiology–the study of life in space–is one of today’s fastest growing and most popular fields of science. In this compelling, accessible, and elegantly reasoned new book, award-winning scholar and researcher Chris Impey explores the foundations of this rapidly developing discipline, where it’s going, and what...

The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

Boring, boring, boring. Isn’t this what immediately comes to mind when one sees books on foundational concepts of information security? Monotonous coverage of theory, dry details of history, brief yet inadequate coverage of every topic known to man, even though you know that you’ll never be hired by the NSA as a...

Packet Guide to Core Network Protocols
Packet Guide to Core Network Protocols

Trying to find the perfect networking resource or textbook can be a real challenge. Sometimes they are extremely focused on one technology, and thus miss the mark. Or they are extremely broad, covering every networking idea known to man. This book is about something that all networks have in common—the core protocols. Networks...

Switching to a Mac For Dummies
Switching to a Mac For Dummies

Maybe you love your iPhone or iPod and are curious about other Apple products. Maybe you’ve had one virus scare too many and are fed up with Windows. Maybe the daunting prospect of upgrading to Windows 7 has made you open to other possibilities. Maybe you’re a Mac fan who wants to show a friend how easy and productive Macs...

Managed Code Rootkits: Hooking into Runtime Environments
Managed Code Rootkits: Hooking into Runtime Environments

We live in a world in which we can’t trust our computers. For example, how can we know for sure that our hardware manufacturer did not hide malicious code in the system’s microchip? Or that our freshly installed operating system does not contain backdoors created by a rogue developer from the OS development team?

...

Web Analytics Action Hero: Using Analysis to Gain Insight and Optimize Your Business
Web Analytics Action Hero: Using Analysis to Gain Insight and Optimize Your Business
This astounding declaration was made by the former PepsiCo executive and Apple CEO John Sculley, the same visionary responsible for ousting Steve Jobs in 1985. While some traditional marketers might still agree with his statement, today most marketing executives recognize data-driven decisions will shape the future of...
Result Page: 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy