Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The First Humans: Origin and Early Evolution of the Genus Homo
The First Humans: Origin and Early Evolution of the Genus Homo

There are some issues in human paleontology that seem to be timeless. Most deal with the origin and early evolution of our own genus – something about which we should care. Some of these issues pertain to taxonomy and systematics. How many species of Homo were there in the Pliocene and Pleistocene? How do we identify the earliest...

Trust-Based Selling: Finding and Keeping Customers for Life
Trust-Based Selling: Finding and Keeping Customers for Life

The first year of developing a new sales territory or customer list is a daunting task—especially in dog-eat-dog industries. The traditional advice is to train quickly on product, grab a customer list, start calling for appointments, discover opportunities, and close deals. In fact, almost every sales model out there is based on nothing...

No Beast So Fierce: The Terrifying True Story of the Champawat Tiger, the Deadliest Animal in History
No Beast So Fierce: The Terrifying True Story of the Champawat Tiger, the Deadliest Animal in History

The astonishing true story of the man-eating tiger that claimed a record 437 human lives

“Thrilling. Fascinating. Exciting.” Wall Street Journal • "Riveting. Haunting.” —Scientific American

Nepal, c....

201 Killer Cover Letters (CD-ROM edition)
201 Killer Cover Letters (CD-ROM edition)
The fastest, easiest way to wow employers and land interviews

Want to writer powerful job-search letters that knock their socks off every time --and spare yourself a lot of agony in the process? 201 Killer Cover Letters: CD-ROM Edition gives you instant access to hundreds of surefire cover letters that you...

XML and Web Services Unleashed
XML and Web Services Unleashed
The Extensible Markup Language is changing the way that information is being stored and exchanged. It is also changing the very way that we think about data. XML Unleashed allows you to unlock this new power and get you well on your way towards developing XML applications and systems that enable your most important business processes, or your...
Optimizing HPC Applications with Intel Cluster Tools: Hunting Petaflops
Optimizing HPC Applications with Intel Cluster Tools: Hunting Petaflops

Optimizing HPC Applications with Intel® Cluster Tools takes the reader on a tour of the fast-growing area of high performance computing and the optimization of hybrid programs. These programs typically combine distributed memory and shared memory programming models and use the Message Passing Interface (MPI) and OpenMP for...

Living With the Internet and Online Dangers (Teen's Guides)
Living With the Internet and Online Dangers (Teen's Guides)

Living with the Internet and Online Dangers highlights the risks and problems that come with modern Web technology, as well as what teens can do to protect themselves. Chapters explore online job hunting, email scams and Internet fraud, finding that special someone online, and wireless security. Written in straightforward language, this new...

Real-Resumes for Computer Jobs (Real-Resumes Series)
Real-Resumes for Computer Jobs (Real-Resumes Series)
Every resume and cover letter in this book actually worked. And most of the resumes and cover letters have common features: all are one-page, all are in the chronological format, and all resumes are accompanied by a companion cover letter. The book is divided into three parts. Part One provides some advice about job hunting. Step...
Connections: Patterns of Discovery
Connections: Patterns of Discovery
Every since the fl int axe triggered the Paleolithic Revolution over two million years ago we have lived by a culture of scarcity. Technology shortfall placed innovative capability in the hands of only a few: those who provided their hunter - gatherer communities with tools for hunting and butchering; then those who could read and write; then, much...
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems

Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python
  • ...
Beginning RPG Maker VX Ace
Beginning RPG Maker VX Ace

Beginning RPG Maker VX Ace takes you through the process of using the RPG Maker VX Ace game development engine to create your very own role playing game. The book has been designed with the complete beginner in mind who has little to no experience with the engine. Tutorials and exercises will take you from installing the software to...

The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit

Master the Metasploit Framework and become an expert in penetration testing.

Key Features

  • Gain a thorough understanding of the Metasploit Framework
  • Develop the skills to perform penetration testing in complex and highly secure environments
  • Learn...
unlimited object storage image
Result Page: 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy