Home | Amazing | Today | Tags | Publishers | Years | Search 
For Crying Out Loud: From Open Outcry to the Electronic Screen
For Crying Out Loud: From Open Outcry to the Electronic Screen

In Praise of For Crying Out Loud

"Endowed with strong parents and a bit of luck, Leo Melamed has made a remarkable escape from Nazi occupied Poland to building one of the pinnacles of global finance. Over four decades and more, he was the leading force in bringing his beloved 'Merc' from obscure trading pits for butter...

Don't Blame the Shorts: Why Short Sellers Are Always Blamed for Market Crashes and How History Is Repeating Itself
Don't Blame the Shorts: Why Short Sellers Are Always Blamed for Market Crashes and How History Is Repeating Itself

"Sloan's easy and informative writing makes for a thoroughly worthwhile update."--BARRON’S

"A useful corrective to the view of short selling as 'unpatriotic' or uniquely anti-social."--John Plender, Financial Times, November 16, 2009

"I liked this...

Principles and Applications of NanoMEMS Physics (Microsystems)
Principles and Applications of NanoMEMS Physics (Microsystems)
The field of Nanotechnology, which aims at exploiting advances in the fabrication and controlled manipulation of nanoscale objects, is attracting worldwide attention. This attention is predicated upon the fact that obtaining early supremacy in this field of miniaturization may well be the key to dominating the world economy of the 21st century, and...
The Well-Grounded Rubyist
The Well-Grounded Rubyist
The Well-Grounded Rubyist takes you from interested novice to proficient practitioner. It's a beautifully written tutorial that begins with the basic steps to get your first Ruby program up and running and goes on to explore sophisticated topics like callable objects, reflection, and threading. Whether the topic is simple or tough, the...
Java Message Service
Java Message Service

Java Message Service, Second Edition, is a thorough introduction to the standard API that supports "messaging" -- the software-to-software exchange of crucial data among network computers. You'll learn how JMS can help you solve many architectural challenges, such as integrating dissimilar systems and applications, increasing...

Seeing the Elephant: Understanding Globalization from Trunk to Tail
Seeing the Elephant: Understanding Globalization from Trunk to Tail

In the new millennium, it is nearly impossible for us to talk about basic concerns like food or gas prices, without examining global intersections in trade, energy, immigration, the environment, and defense. Many countries once described as "developing" nations now wield greater economic and political influence than some of the...

Unlocking Android
Unlocking Android
Android is a free, open source, Java-based mobile platform developed by Google. Unlocking Android prepares the reader to embrace the Android mobile platform in easy-to-understand language and builds on this foundation with reusable Java code examples. It's ideal for corporate developers and hobbyists who have an interest, or a mandate, to...
Botnets: The Killer Web App
Botnets: The Killer Web App
This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise!

The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world
...
Foundation ASP.NET for Flash
Foundation ASP.NET for Flash
ASP.NET 2.0 is the new version of Microsoft's groundbreaking server-side scripting language. There is currently a huge demand to integrate dynamic content into Flash websites and applications and, as a solid competitor to technologies such as JSP, PHP, and ColdFusion, ASP.NET is one of the most popular choices to achieve this.

Used in...

The Software Vulnerability Guide (Programming Series)
The Software Vulnerability Guide (Programming Series)
In today’s market, secure software is a must for consumers. Many developers, however, are not familiar with the techniques needed to produce secure code or detect existing vulnerabilities. The Software Vulnerability Guide focuses on the origin of most software vulnerabilities, including the bugs in the underlying software used to develop IT...
Neuroengineering
Neuroengineering
Comprehensive, practical, and broad in scope, Neuroengineering offers clinical insights on revolutionary technologies from prominent neurosurgeons and neurologists. This book presents a wide range of new developments in the field and high-impact emerging technologies that are poised to change the industry, described in detailed...
Java EE 5 Development with NetBeans 6
Java EE 5 Development with NetBeans 6

Java EE 5, the successor to J2EE, greatly simplifies the development of enterprise applications. The popular IDE, NetBeans, has several features that greatly simplify Java EE 5 development, and this book shows you how to make use of these features to make your Java programming more efficient and productive than ever before. With many features...

Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy