Home | Amazing | Today | Tags | Publishers | Years | Search 
Legacy of Secrecy: The Long Shadow of the JFK Assassination
Legacy of Secrecy: The Long Shadow of the JFK Assassination
John F. Kennedy's assassination launched a frantic search to find his killers. It also launched a flurry of covert actions by Lyndon Johnson, Robert F. Kennedy, and other top officials to hide the fact that in November 1963 the United States was on the brink of invading Cuba, as part of a JFK-authorized coup. The coup plan's...
Bioterror: Anthrax, Influenza, and the Future of Public Health Security (Praeger Security International)
Bioterror: Anthrax, Influenza, and the Future of Public Health Security (Praeger Security International)

This book uses the 2001 anthrax attacks as its point of departure for an analysis of the past, present, and future of America's preparedness to deal with major challenges to public health, including bioterrorism and pandemic flu. The study identified the strength and weaknesses of the system while making recommendations for improvements....

The Cambridge Economic History of the United States, Vol. 3: The Twentieth Century (Volume 3)
The Cambridge Economic History of the United States, Vol. 3: The Twentieth Century (Volume 3)

Volume 3 surveys the economic history of the United States, Canada, and the Caribbean during the twentieth century. Its chapters trace the century's major events, notably the Great Depression and the two world wars, as well as its long-term trends, such as changing technology, the rise of the corporate economy, and the development of...

Satellite Systems for Personal Applications: Concepts and Technology
Satellite Systems for Personal Applications: Concepts and Technology

Presents the concepts, technology, and role of satellite systems in support of personal applications, such as mobile and broadband communications, navigation, television, radio and multimedia broadcasting, safety of life services, etc.

This book presents a novel perspective on satellite systems, reflecting the modern...

Microsoft(R) SQL Server(R) 2008 Administrator's Pocket Consultant
Microsoft(R) SQL Server(R) 2008 Administrator's Pocket Consultant

From the author and series editor of the immensely popular ADMINISTRATOR'S POCKET CONSULTANT series from Microsoft Press®-this pocket-size guide delivers fast, accurate answers on the spot for IT professionals.

Microsoft® SQL Server® 2008 Administrator's Pocket Consultant, 2nd Edition is the...

JUNOS Security
JUNOS Security

Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations...

Biodiversity under Threat (Issues in Environmental Science and Technology)
Biodiversity under Threat (Issues in Environmental Science and Technology)

'This is a timely, thoughtful and authoritative account of the current state of play on the ecological battlefront'. Rouvray D., 2008. Biodiversity for chemists. Chemistry World, 5 (1), p.p.64-65.

There is much public concern about threats to global biodiversity. Industrial pollution, changes in agricultural practices...

Encyclopedia of Energy Engineering and Technology - 3 Volume Set (Print Version) (v. 13)
Encyclopedia of Energy Engineering and Technology - 3 Volume Set (Print Version) (v. 13)

Using limited resources in sustainable ways, energy engineers and technologists have made people's lives comfortable and affordable with efficient and cost-effective technology, from air conditioners to waste fuels. But to accommodate the expanding world population, the global supply of energy has been increasingly strained. Energy...

Developing Web Services with Apache Axis2
Developing Web Services with Apache Axis2

If you'd like to learn how to create web services (in particular, using Apache Axis2) and make some sense of various standards like SOAP, WSDL, MTOM, WS-Addressing, WS-Security, WS-Policy, XML Encryption and XML Signature, then this book is for you. Why? First, it has a tutorial style that walks you through in a step-by-step manner....

The Econosphere: What Makes the Economy Really Work, How to Protect It, and Maximize Your Opportunity for Financial Prosperity
The Econosphere: What Makes the Economy Really Work, How to Protect It, and Maximize Your Opportunity for Financial Prosperity

How the World Really Worksand How to Make It Start Working Again!

 

·   Discover the immutable laws of nature that govern all your financial decisions–and put them to work for you

Data Protection in a Profiled World
Data Protection in a Profiled World

One of the most challenging issues facing our current information society is the accelerating accumulation of data trails in transactional and communication systems, which may be used not only to profile the behaviour of individuals for commercial, marketing and law enforcement purposes, but also to locate and follow things and actions. Data...

Crossing the Energy Divide: Moving from Fossil Fuel Dependence to a Clean-Energy Future
Crossing the Energy Divide: Moving from Fossil Fuel Dependence to a Clean-Energy Future

Praise for Crossing the Energy Divide

 

“This book makes coherent and rigorous arguments that increasing energy efficiency is the primary driver of economic growth today and is key to managing climate change.”

...
Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy