Home | Amazing | Today | Tags | Publishers | Years | Search 
Language in Cognition and Affect (Second Language Learning and Teaching)
Language in Cognition and Affect (Second Language Learning and Teaching)

The volume contains most updated theoretical and empirical research on foreign or second language processes analyzed from the perspective of cognition and affect. It consists of articles devoted to various issued related to such broad topics as gender, literacy, translation or culture, to mention a few. The collection of papers offers a...

The Craving Mind: From Cigarettes to Smartphones to Love – Why We Get Hooked and How We Can Break Bad Habits
The Craving Mind: From Cigarettes to Smartphones to Love – Why We Get Hooked and How We Can Break Bad Habits
A leading neuroscientist and pioneer in the study of mindfulness explains why addictions are so tenacious and how we can learn to conquer them

We are all vulnerable to addiction. Whether it’s a compulsion to constantly check social media, binge eating, smoking, excessive drinking, or any other behaviors, we may
...
User-Centered Agile Method
User-Centered Agile Method

Agile development methods began to emerge around 20 years ago. However, it was not until the early 2000s that they began to be widely used in industry. This growth was often due to the advent of Internet services requiring faster cycles of development in order to heighten the rate at which an ever-greater number of functionalities...

Perspectives on Early Islamic Mysticism: The World of al-?ak?m al-Tirmidh? and his Contemporaries (Routledge Sufi Series)
Perspectives on Early Islamic Mysticism: The World of al-?ak?m al-Tirmidh? and his Contemporaries (Routledge Sufi Series)

This monograph explores the original literary produce of Muslim mystics during the eighth–tenth centuries, with special attention to ninth-century mystics, such as al-Tustar?, al-Mu??sib?, al-Kharr?z, al-Junayd and, in particular, al-?ak?m al-Tirmidh?. Unlike other studies dealing with the so-called ‘Formative...

Quarantine with Protein: Protein-packed recipes less than 6 feet away
Quarantine with Protein: Protein-packed recipes less than 6 feet away
Stuck at home and need to eat? These recipes were curated with the full essence of 2020 quarantine life that will get you through anything. Whether that's meeting your nutritional goals or making all the delicious meals you enjoy going out for right at home, this book has got you covered regardless of whether you're in...
Photoshop CS2 Bible, Professional Edition
Photoshop CS2 Bible, Professional Edition
Inside, you'll find advanced coverage of Photoshop CS2
  • Explore new ways to adjust and enhance color
  • Use retouching and color adjustment techniques to correct seemingly impossible-to-fix images
  • Gain control over digital camera images with Photoshop's enhanced Camera Raw capabilities
  • Manage...
50 Battles That Changed the World
50 Battles That Changed the World
Any attempt to list the 50 most important battles in all history is necessarily subjective. To list them in order of importance is an even greater exercise of chutzpah. Nevertheless, people have been listing decisive battles since Sir Edward Creasy, a lawyer who taught history, a century-and-a-half ago. Other compilers include...
HTML in 10 Steps or Less
HTML in 10 Steps or Less
If you are building your own Web pages and need HTML solutions fast, then this book is for you--whether you’re new to Web site authoring or you need a quick refresher on how to create a table. Open the book and you’ll discover clear, easy-to-follow instructions for more than 250 key HTML Web tasks, each presented in ten quick steps--or...
Security Assessment: Case Studies for Implementing the NSA IAM
Security Assessment: Case Studies for Implementing the NSA IAM
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or...
Software Studies: A Lexicon (Leonardo Books)
Software Studies: A Lexicon (Leonardo Books)
This collection of short expository, critical, and speculative texts offers a field guide to the cultural, political, social, and aesthetic impact of software. Computing and digital media are essential to the way we work and live, and much has been said about their influence. But the very material of software has often been left invisible. In...
Humanity 2.0: What it Means to be Human Past, Present and Future
Humanity 2.0: What it Means to be Human Past, Present and Future
Social thinkers in all fields are faced with one unavoidable question: what does it mean to be 'human' in the 21st century? As definitions between what is 'animal' and what is 'human' break down, and as emerging technologies such as artificial intelligence and nano- and bio- technologies develop, accepted...
Inside the C++ Object Model
Inside the C++ Object Model
Inside the C++ Object Model focuses on the underlying mechanisms that support object-oriented programming within C++: constructor semantics, temporary generation, support for encapsulation, inheritance, and "the virtuals"-virtual functions and virtual inheritance. This book shows how your understanding the underlying implementation models...
Result Page: 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy