Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Craving Mind: From Cigarettes to Smartphones to Love – Why We Get Hooked and How We Can Break Bad Habits
The Craving Mind: From Cigarettes to Smartphones to Love – Why We Get Hooked and How We Can Break Bad Habits
A leading neuroscientist and pioneer in the study of mindfulness explains why addictions are so tenacious and how we can learn to conquer them

We are all vulnerable to addiction. Whether it’s a compulsion to constantly check social media, binge eating, smoking, excessive drinking, or any other behaviors, we may
...
Handbook of Personology and Psychopathology
Handbook of Personology and Psychopathology
A MONUMENTAL WORK IN THE STUDY OF HUMAN CHARACTER AND ALL OF ITS COMPLEXITIES

The Handbook of Personology and Psychopathology offers a state-of-the-art overview of a burgeoning field of inquiry that addresses the full spectrum of human personality and functioning, from normal to abnormal. Inspired by the seminal contributions and achievements...

Digital Video Distribution in Broadband, Television, Mobile and Converged Networks: Trends, Challenges and Solutions
Digital Video Distribution in Broadband, Television, Mobile and Converged Networks: Trends, Challenges and Solutions

A unique treatment of digital video distribution technology in a business context, Digital Video Distribution in Broadband, Television, Mobile and Converged Networks explores a range of diverse topics within the field through a combination of theory and practice to provide the best possible insight and exposure. The theoretical...

Security Assessment: Case Studies for Implementing the NSA IAM
Security Assessment: Case Studies for Implementing the NSA IAM
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or...
HTML in 10 Steps or Less
HTML in 10 Steps or Less
If you are building your own Web pages and need HTML solutions fast, then this book is for you--whether you’re new to Web site authoring or you need a quick refresher on how to create a table. Open the book and you’ll discover clear, easy-to-follow instructions for more than 250 key HTML Web tasks, each presented in ten quick steps--or...
Pediatric Emergency Medicine Companion Handbook
Pediatric Emergency Medicine Companion Handbook
This handbook accompanies the first edition of our text Pediatric Emergency Medicine: A Comprehensive Study Guide. The purpose of the handbook is to provide an on-the-spot summary of the clinical problem for the student, resident, or clinician. The handbook does not replace the text. Rather, it addresses the need for a more...
How the Snake Lost its Legs: Curious Tales from the Frontier of Evo-Devo
How the Snake Lost its Legs: Curious Tales from the Frontier of Evo-Devo

How did the zebra really get its stripes, and the giraffe its long neck? What is the science behind camel humps, leopard spots, and other animal oddities? Such questions have fascinated us for centuries, but the expanding field of evo-devo (evolutionary developmental biology) is now providing, for the first time, a wealth of insights and...

Bear Market Investing Strategies (Wiley Trading)
Bear Market Investing Strategies (Wiley Trading)
"The first investment book I ever read - in the late 1960s - was Harry Schultz's Bear Markets. After watching the late 1990s lunacy and inevitable fallout, I feel every market student and investor should read a great book on bear markets and thus become wise through the printed word not later through painful disillusion. To the rescue...
Inside the C++ Object Model
Inside the C++ Object Model
Inside the C++ Object Model focuses on the underlying mechanisms that support object-oriented programming within C++: constructor semantics, temporary generation, support for encapsulation, inheritance, and "the virtuals"-virtual functions and virtual inheritance. This book shows how your understanding the underlying implementation models...
Organic Chemistry: An Intermediate Text
Organic Chemistry: An Intermediate Text

A foundation for success in advanced organic chemistry courses–and careers

Graduate students taking advanced organic chemistry courses often need a refresher on the discipline before they can move on to more specialized topics. This is especially true of students whose last formal exposure to organic chemistry was during...

Cancer Precursors: Epidemiology, Detection, and Prevention
Cancer Precursors: Epidemiology, Detection, and Prevention
Dramatic advances in our understanding of cancer causation have come from epidemiologic and laboratory research, particularly over the past two decades. These developments have included a broadening interest in the critical events that take place during the early stages of the dynamic multistep process leading to invasive...
Software Studies: A Lexicon (Leonardo Books)
Software Studies: A Lexicon (Leonardo Books)
This collection of short expository, critical, and speculative texts offers a field guide to the cultural, political, social, and aesthetic impact of software. Computing and digital media are essential to the way we work and live, and much has been said about their influence. But the very material of software has often been left invisible. In...
Result Page: 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy