Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
From Raj to Republic: Sovereignty, Violence, and Democracy in India (South Asia in Motion)
From Raj to Republic: Sovereignty, Violence, and Democracy in India (South Asia in Motion)
BETWEEN 1946 AND 1952, the British Raj, the world’s largest colony, was transformed into the Republic of India, the world’s largest democracy. Independence, the Constituent Assembly Debates, the founding of the Republic, and India’s first universal franchise general election took place amid the violence and...
YouTube: An Insider's Guide to Climbing the Charts
YouTube: An Insider's Guide to Climbing the Charts
Let me begin by making an observation that the authors are too humble to make for themselves: This book will change your life. But more on that in a moment. First I’m going to do something prototypically YouTubian: I’m going to talk about myself.

Like most people, I got to know YouTube as
...
Mass Customization: Opportunities, Methods, and Challenges for Manufacturers
Mass Customization: Opportunities, Methods, and Challenges for Manufacturers

Mass Customization examines the business opportunities, considerations, and challenges manufacturers in various industries must weigh before committing to the significant investment in machinery and software needed to go to mass customization. For manufacturers who decide that it’s time to take the plunge, the author describes...

Starship Therapise: Using Therapeutic Fanfiction to Rewrite Your Life
Starship Therapise: Using Therapeutic Fanfiction to Rewrite Your Life
I write this foreword during a pandemic of epic proportion, one not only wrought by nature but also helped along by those entrusted with her care. It may very well be that we are actualizing the Terminator’s prophecy when he matter-of-factly proclaimed, as if simply reading from the pages of history, that “it is in...
Troubleshooting IP Routing Protocols (CCIE® Professional Development)
Troubleshooting IP Routing Protocols (CCIE® Professional Development)

The comprehensive, hands-on guide for resolving IP routing problems:

  • Understand and overcome common routing problems associated with BGP, IGRP, EIGRP, OSPF, IS-IS, multicasting, and RIP, such as route installation, route advertisement, route redistribution, route summarization,...

Digital Piracy (Cybersafety)
Digital Piracy (Cybersafety)

The Internet has had and will continue to have a profound effect on society. It is hard to imagine life without such technologies as computers, cell phones, gaming devices, and so on. The Internet, World Wide Web, and their associated technologies have altered our social and personal experience of the world. In no other time in...

Bridges to Infinity: The Human Side of Mathematics
Bridges to Infinity: The Human Side of Mathematics
Most of the reasons that I have written this book can be explained in terms of what reportedly happened one day in the eighteenth century when the great German mathematician Leonhard Euler confronted the eminent French scholar and atheist Denis Diderot with a spurious mathematical proof for the existence of God. Euler, it seems, accepted an...
The Crowded Hour: Theodore Roosevelt, the Rough Riders, and the Dawn of the American Century
The Crowded Hour: Theodore Roosevelt, the Rough Riders, and the Dawn of the American Century
A NEW YORK TIMES 100 NOTABLE BOOKS OF 2019 SELECTION

The dramatic story of the most famous regiment in American history: the Rough Riders, a motley group of soldiers led by Theodore Roosevelt, whose daring exploits marked the beginning of American imperialism in the 20th century.

When
...
Financial Accounting: An Integrated Statements Approach
Financial Accounting: An Integrated Statements Approach

Duchac, Reeve, Warren provides an effective new approach to help accounting majors and business students learn and understand financial accounting. The text introduces an integrated financial statements framework that clearly illustrates the inter-relationships between the cash flow statement, income statement and the balance sheet. This...

Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security
Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security
Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.

Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the
...
Designing Embedded Hardware
Designing Embedded Hardware

This is a book about designing computer hardware and specifically about designing small machines for embedded applications. It is intentionally hardware specific. There are plenty of books out there on writing code for embedded systems (such as Michael Barr's excellent Programming Embedded Systems in C and C++, another...

Debugging with GDB: The GNU Source-Level Debugger for GDB
Debugging with GDB: The GNU Source-Level Debugger for GDB
The purpose of a debugger such as gdb is to allow you to see what is going on “inside” another program while it executes—or what another program was doing at the moment it crashed.

gdb is free software, protected by the gnu General Public License (GPL). The GPL gives you the freedom to copy or adapt a licensed
...
unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy