Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practice Makes Perfect: Basic English, Premium Third Edition
Practice Makes Perfect: Basic English, Premium Third Edition
Get the skills you need to read and speak English with confidence!


Learn how to read and speak English with this easy-to-use workbook. Dozens of manageable, bite-sized lessons take you through the basics of the English language. Three-page units cover each subject, which can be completed in just 20
...
SHARKS in the MOAT: How to Create Truly Secure Software
SHARKS in the MOAT: How to Create Truly Secure Software
Believe it or not, there is a striking similarity between medieval castle design and how we protect networks and data in the 21st century. By examining how our ancestors fought off invading armies, it becomes much easier to understand the latest strategies for keeping hackers at-bay. This book is designed for anyone who wants to understand how...
The Dark Side of Leadership: An Institutional Perspective
The Dark Side of Leadership: An Institutional Perspective

Contrary to the notion that leaders contribute to positive behaviour within organisations, this book reflects growing interest in the ‘dark side’ of leadership: the unethical and immoral personalities that can reside in positions of power. Drawing on empirical and theoretical analysis, the author examines immorality...

Why Capitalists Need Communists: The Politics of Flourishing (Wellbeing in Politics and Policy)
Why Capitalists Need Communists: The Politics of Flourishing (Wellbeing in Politics and Policy)
Britain faces huge challenges: inequality, public services under constant pressure, climate change - and in the long term, the impacts of automation and artificial intelligence. At the same time, the political and economic elite seem to have reached an impasse: there is a sense that things can only get worse. In Why Capitalists Need...
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat...

Java Language Features: With Modules, Streams, Threads, I/O, and Lambda Expressions
Java Language Features: With Modules, Streams, Threads, I/O, and Lambda Expressions
Work with essential and advanced features of the Java programming language such as Java modules development, lambda expressions (closures), inner classes, threads, I/O, Collections, garbage collection, and more. Author Kishori Sharan provides over 50 diagrams and 290 complete programs to help you visualize and better understand the topics...
Uproar: Calm Leadership in Anxious Times
Uproar: Calm Leadership in Anxious Times
If “these are the times that test men’s souls,” never more than for the leader’s ability to think clearly, to be present calmly, and to challenge effectively. It’s a time when leaders cannot be as anxious as those they serve; otherwise, the system is leaderless. Anxiety flows down like water from a leaky...
The Heartland: An American History
The Heartland: An American History
A history of a quintessentially American place--the rural and small town heartland--that uncovers deep yet hidden currents of connection with the world.

When Kristin L. Hoganson arrived in Champaign, Illinois, after teaching at Harvard, studying at Yale, and living in the D.C. metro area with various stints overseas,
...
Beginning Rust: From Novice to Professional
Beginning Rust: From Novice to Professional
Learn to program with Rust in an easy, step-by-step manner on Unix, Linux shell, macOS and the Windows command line.  As you read this book, you’ll build on the knowledge you gained in previous chapters and see what Rust has to offer.  

Beginning Rust starts with...
Foundations for Analytics with Python
Foundations for Analytics with Python

If you’re like many of Excel’s 750 million users, you want to do more with your data—like repeating similar analyses over hundreds of files, or combining data in many files for analysis at one time. This practical guide shows ambitious non-programmers how to automate and scale the processing and analysis of data in...

Essentials of Mathematical Methods in Science and Engineering
Essentials of Mathematical Methods in Science and Engineering

A comprehensive introduction to the multidisciplinary applications of mathematical methods, revised and updated

The second edition of Essentials of Mathematical Methods in Science and Engineering offers an introduction to the key mathematical concepts of advanced calculus, differential equations, complex...

Data Breaches: Crisis and Opportunity
Data Breaches: Crisis and Opportunity
Protect Your Organization Against Massive Data Breaches and Their Consequences

Data breaches can be catastrophic, but they remain mysterious because victims don’t want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines a light on these events,
...
Result Page: 243 242 241 240 239 238 237 236 235 234 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy