Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Captain Bligh's Portable Nightmare: From the Bounty to Safety?4,162 Miles across the Pacific in a Rowing Boat
Captain Bligh's Portable Nightmare: From the Bounty to Safety?4,162 Miles across the Pacific in a Rowing Boat
At dawn on April 28, 1789, Captain William Bligh and eighteen men from HMS Bounty were herded onto a twenty-three-foot launch and abandoned in the middle of the Pacific Ocean. Thus began their extraordinary journey to Java. Covering 4,162 miles, the small boat was battered by continuous storms, and the men on board suffered crippling...
A History of Modern Urban Operations
A History of Modern Urban Operations
This book investigates the complexities of modern urban operations?a particularly difficult and costly method of fighting, and one that is on the rise. Contributors examine the lessons that emerge from a range of historical case studies, from nineteenth-century precedents to the Battle of Shanghai; Stalingrad, German town clearance, Mandalay,...
Programming Amazon EC2
Programming Amazon EC2

Thank you for picking up a copy of this book. Amazon Web Services (AWS) has amazed everyone: Amazon has made lots of friends, and all its “enemies” are too busy admiring AWS to do much fighting back. At the moment, there is no comparable public Infrastructure as a Service (IaaS); AWS offers the services at a scale that has...

Fighting Terror in Cyberspace (Series in Machine Perception & Artifical Intelligence)
Fighting Terror in Cyberspace (Series in Machine Perception & Artifical Intelligence)
The Internet, or the ARPANET in its original name, was a remarkable idea. The Net was designed in the late 60's by US ARPA (Advanced Research Projects Agency) to connect distant computers to each other. This was a critical need at a time when each computer was a precious resource of computing power, which, if connected, could be shared among...
PC Magazine Fighting Spyware, Viruses, and Malware
PC Magazine Fighting Spyware, Viruses, and Malware
Think there's no malicious software on your computer? PC Magazine thinks you should think again.

Scans by ISPs have revealed as many as twenty-eight spyware programs running on the average home computer—like yours. That's a lot of people prying into what's on your PC, and a DSL or cable connection is a virtual welcome mat. But by...

Robert Ludlum's The Bourne Legacy
Robert Ludlum's The Bourne Legacy

In Robert Ludlum's ground-breaking career, no other character so captured and held the world's imagination as Jason Bourne. He appeared in three of Robert Ludlum's own #1 bestselling novels - The Bourne Identity, The Bourne Supremacy, and The Bourne Ultimatum - and they remain amongst Ludlum's most-read...

Ending Spam: Bayesian Content Filtering and the Art of Statistical Language Classification
Ending Spam: Bayesian Content Filtering and the Art of Statistical Language Classification
Join author John Zdziarski for a look inside the brilliant minds that have conceived clever new ways to fight spam in all its nefarious forms. This landmark title describes, in-depth, how statistical filtering is being used by next-generation spam filters to identify and filter unwanted messages, how spam filtering works and how language...
Batman and Ethics
Batman and Ethics

Batman has been one of the world’s most beloved superheroes since his first appearance in Detective Comics #27 in 1939. Clad in his dark cowl and cape, he has captured the imagination of millions with his single-minded mission to create a better world for the people of Gotham City by fighting crime, making use of expert...

Beginning SQL Server 2000 DBA: From Novice to Professional
Beginning SQL Server 2000 DBA: From Novice to Professional
Have you been considering a career change and thinking about becoming a SQL Server DBA (database administrator)? Perhaps you've been given the responsibility oflooking after a SQJ. Server and you aren't quite sure what this really means or where you should start? Maybe you're just interested in finding out what on earth...
A Fire in the Wilderness: The First Battle Between Ulysses S. Grant and Robert E. Lee
A Fire in the Wilderness: The First Battle Between Ulysses S. Grant and Robert E. Lee
The riveting account of the first bloody showdown between Ulysses S. Grant and Robert E. Lee—a battle that sealed the fate of the Confederacy and changed the course of American history. 

In the spring of 1864, President Lincoln feared that he might not be able to save the Union. The Army of
...
Using Social Media for Global Security
Using Social Media for Global Security

Essential reading for cybersecurity professionals, security analysts, policy experts, decision-makers, activists, and law enforcement!

During the Arab Spring movements, the world witnessed the power of social media to dramatically shape events. Now this timely book shows government decision-makers, security analysts, and...

Gender in International Relations
Gender in International Relations
As a scholar and teacher of international relations, I have frequently asked myself the following questions: Why are there so few women in my discipline? If I teach the field as it is conventionally defined, why are there so few readings by women to assign to my students? Why is the subject matter of my discipline so distant from women's lived...
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy