Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Polar Bear Expedition: The Heroes of America's Forgotten Invasion of Russia, 1918-1919
The Polar Bear Expedition: The Heroes of America's Forgotten Invasion of Russia, 1918-1919

In the brutally cold winter of 1919, 5,000 Americans battled the Red Army 600 miles north of Moscow. We have forgotten. Russia has not.

"AN EXCELLENT BOOK." —Wall Street Journal • "INCREDIBLE." — John U. Bacon •...

Lonely Planet Andalucia (Regional Guide)
Lonely Planet Andalucia (Regional Guide)

Lonely Planet: The world's leading travel guide publisher

Lonely Planet's Andalucíais your passport to the most relevant, up-to-date advice on what to see and skip, and what hidden discoveries await you. Experience the Alhambra's perfect blend of architecture and nature, visit the...

International Labour Organization and Global Social Governance
International Labour Organization and Global Social Governance
This open access book explores the role of the ILO (International Labour Organization) in building global social governance from multiple and mutually complementary perspectives. It explores the impact of this UN´s oldest agency, founded in 1919, on the transforming world of work in a global setting, providing insights...
Java, Java, Java, Object-Oriented Problem Solving (3rd Edition)
Java, Java, Java, Object-Oriented Problem Solving (3rd Edition)

This second edition of Java, Java, Java offers a robust, accessible, and flexible problem-solving perspective. The use of Unified Modeling Language (UML) diagrams throughout the text, strongly emphasizes object-oriented design. This book assists students and professionals with their most challenging problem as beginning programmers:...

Introduction to Logistics Systems Planning and Control (Wiley Interscience Series in Systems and Optimization)
Introduction to Logistics Systems Planning and Control (Wiley Interscience Series in Systems and Optimization)
Logistic systems constitute one of the cornerstones in the design and control of production systems and the modelling of supply chains. They are key to a number of industries, and courses teaching logistics systems planning and control are becoming more widespread. Introduction to Logistics Systems Planning and Control is the first book to...
Ambient Intelligence: A Novel Paradigm
Ambient Intelligence: A Novel Paradigm
If the space around us could adapt to our needs and intentions, then our lives
would be much simpler. We would have to spend less time on our daily chores,
we would be more productive and, hopefully, we would live in a less worrisome
and, most likely, more secure world.

Ideally, it would be great if we could live our lives
...
Quantum Computing and Communications: An Engineering Approach
Quantum Computing and Communications: An Engineering Approach
Quantum computers will revolutionize the way telecommunications networks function.

Quantum computing holds the promise of solving problems that would be intractable with conventional computers, by implementing principles from quantum physics in the development of computer hardware, software and communications equipment....

Jess in Action: Java Rule-Based Systems
Jess in Action: Java Rule-Based Systems
A practical handbook for anyone interested in programming rule-based systems and written by the creator of the popular Java rule engine, Jess, this book is structured around a series of large, fully developed practical examples of rule-based programming in Java. After the topic of rule-based systems is introduced, software developers and...
CSS Cookbook, 2nd Edition
CSS Cookbook, 2nd Edition

As the industry standard method for enriching the presentation of HTML-based web pages, Cascading Style Sheets (CSS) allow you to give web pages more structure and a more sophisticated look. But first, you have to get past CSS theory and resolve real-world problems.

For those all-too-common dilemmas that...

Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
"Few false ideas have more firmly gripped the minds of so many intelligent men than the one that, if they just tried, they could invent a cipher that no one could break," writes David Kahn in this massive (almost 1,200 pages) volume. Most of The Codebreakers focuses on the 20th century, especially World War II. But its reach is...
Deploying Cisco Voice over IP Solutions
Deploying Cisco Voice over IP Solutions
If you've got a wide area network (WAN) already, putting interoffice voice traffic on it is an obvious application for it. Voice signals take up so little bandwidth, and the cost savings can be so significant, that Voice over IP (VoIP) deserves serious consideration. However, you can easily throw away years of cost savings by bringing in...
unlimited object storage image
Result Page: 1199 1198 1197 1196 1195 1194 1193 1192 1191 1190 1189 1188 1187 1186 1185 1184 1183 1182 1181 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy