Home | Amazing | Today | Tags | Publishers | Years | Search 
Greater Kenyir Landscapes: Social Development and Environmental Sustainability: From Ridge to Reef
Greater Kenyir Landscapes: Social Development and Environmental Sustainability: From Ridge to Reef

This book contains research findings from three major study areas, natural sciences, social sciences, and public policy and management. The focus area extends over geographical zones ranging from mountainous area of Mount Gagau in the Taman Negara National Park, down to the coastal islands of Bidong, Redang and Perhentian on the...

The Emanated Scripture of Manjushri: Shabkar's Essential Meditation Instructions (Tsadra)
The Emanated Scripture of Manjushri: Shabkar's Essential Meditation Instructions (Tsadra)
Instructions for traversing the entire Vajrayana path to enlightenment from one of Tibet's most famous wandering yogis.

Composed by Shabkar at the Cave of Miracles close to Mount Kailash around 1815, this compendium of spiritual instructions is written in the form of questions and answers, alternating verse and
...
The Hunt for Mount Everest
The Hunt for Mount Everest

The height of Mt. Everest was first measured in 1850, but the closest any westerner got to Everest during the next 71 years, until 1921, was 40 miles. The Hunt for Mt. Everest tells the story of the 71-year quest to find the world's highest mountain. It's a tale of high drama, of larger-than-life characters-George...

Malicious Cryptography: Exposing Cryptovirology
Malicious Cryptography: Exposing Cryptovirology
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first...
How Would You Move Mount Fuji?: Microsoft's Cult of the Puzzle -- How the World's Smartest Companies Select the Most Creative Thinkers
How Would You Move Mount Fuji?: Microsoft's Cult of the Puzzle -- How the World's Smartest Companies Select the Most Creative Thinkers

Microsoft's notoriously grueling interview process has been emulated by companies everywhere that seek to separate the most creative thinkers from the merely brilliant. HOW WOULD YOU MOVE MOUNT FUJI? reveals more than 35 of these challenging riddles and puzzles and, for the first time, shows how answers can be found through creative and...

Intrusion Detection and Prevention
Intrusion Detection and Prevention

In today’s converged networking environment, cyber crime is on the rise and getting more sophisticated every day. Malicious hackers lurk in dark corners, scanning for vulnerable systems and launching debilitating attacks. Intrusion Detection & Prevention shows you, step-by-step, how to mount a comprehensive defense,...

Mac OS X Unix 101 Byte-Sized Projects
Mac OS X Unix 101 Byte-Sized Projects
Unix is no longer someone else's OS. With Mac OS X built on top of it, Unix  is becoming a household name, and more and more Mac users are ready to take it on. This book is for them! Based on a popular series of Unix tips, this book promises to deliver what most other Unix guides fail to: comprehensive tutorials and instruction on specific...
Emotional Terrors in the Workplace: Protecting Your Business' Bottom Line
Emotional Terrors in the Workplace: Protecting Your Business' Bottom Line
The failure to adequately address the victims and the emotional dimensions of corporate problems changes adverse events into crises and catastrophes. This book aims to arm employees and managers with the tools necessary to manage emotional distress.

Emotional Terrors in the Workplace: Protecting Your Business' Bottom Line is an...

Linux Network Administrator's Guide
Linux Network Administrator's Guide
Linux, a UNIX-compatible operating system that runs on personal computers, is a pinnacle within the free software movement. It is based on a kernel developed by Finnish student Linus Torvalds and is distributed on the Net or on low-cost disks, along with a complete set of UNIX libraries, popular free software utilities, and traditional layered...
Red Hat Linux 9 Professional Secrets
Red Hat Linux 9 Professional Secrets
This ultimate under-the-hood guide to Red Hat Linux 9 takes the reader beyond obvious information about this complicated OS, revealing hidden features, tricks and alternate methods not easily found elsewhere.

It takes an expert to unlock the deepest secrets of Red Hat Linux 9–to show you what’s really under the hood and how
...
A Carrot a Day: A Daily Dose of Recognition for Your Employees
A Carrot a Day: A Daily Dose of Recognition for Your Employees
From the bestselling authors of The 24-Carrot Manager comes a manager's handbook on motivating employees through praise and recognition. Employees fed a steady diet of carrots focus better on company goals. They spot new opportunities faster. They have longer employment life spans (translation: lower turnover). And they can lift companies higher...
The Circuit Designer's Companion, Second Edition
The Circuit Designer's Companion, Second Edition
A unique masterclass in the design of optimized, reliable electronic circuits
Beyond the lab a guide to electronic design for production, where cost-effective design is imperative
Tips and know-how provide a whole education for the novice, with something to offer the most seasoned professional

Tim Williams' Circuit
...
Result Page: 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy