Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Basic Modern Algebra with Applications
Basic Modern Algebra with Applications

The book is primarily intended as a textbook on modern algebra for undergraduate mathematics students. It is also useful for those who are interested in supplementary reading at a higher level. The text is designed in such a way that it encourages independent thinking and motivates students towards further study. The book covers all major...

CCIE: Cisco Certified Internetwork Expert Study Guide, Second Edition
CCIE: Cisco Certified Internetwork Expert Study Guide, Second Edition

Here's the book you need to prepare for Cisco's CCIE Qualification and Lab Exams. This Study Guide provides:

  • Assessment testing to focus and direct your studies
  • In-depth coverage of all exam objectives
  • Hundreds of challenging practice questions, in...
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Quiet Mind, Fearless Heart: The Taoist Path through Stress and Spirituality
Quiet Mind, Fearless Heart: The Taoist Path through Stress and Spirituality
"Reading Quiet Mind, Fearless Heart is like eavesdropping on a conversation between Lao Tzu and Joseph Campbell—a pure pleasure to read!"
—Deepak Chopra, M.D., coauthor of The Seven Spiritual Laws of Yoga and author of The Spontaneous Fulfillment of Desire

"Quiet Mind, Fearless Heart is an enchanting piece...

Near Rings, Fuzzy Ideals, and Graph Theory
Near Rings, Fuzzy Ideals, and Graph Theory

Near Rings, Fuzzy Ideals, and Graph Theory explores the relationship between near rings and fuzzy sets and between near rings and graph theory. It covers topics from recent literature along with several characterizations.

After introducing all of the necessary fundamentals of algebraic systems, the book presents...

The Self and its Shadows: A Book of Essays on Individuality as Negation in Philosophy and the Arts
The Self and its Shadows: A Book of Essays on Individuality as Negation in Philosophy and the Arts

Stephen Mulhall presents a series of multiply interrelated essays which together make up an original study of selfhood (subjectivity or personal identity). He explores a variety of articulations (in philosophy, psychoanalysis, and the arts) of the idea that selfhood is best conceived as a matter of non-self-identity--for example, as becoming...

Skype Hacks: Tips & Tools for Cheap, Fun, Innovative Phone Service
Skype Hacks: Tips & Tools for Cheap, Fun, Innovative Phone Service

If you've heard about Skype--and who hasn't with all the recent media attention devoted to internet telephone services--chances are you've been mighty tempted to try it out. Skype Hacks tells you what all the Skype hype is about, explains the basics, and shows you more than 100 clever tips and...

Internetworking Troubleshooting Handbook (2nd Edition)
Internetworking Troubleshooting Handbook (2nd Edition)
If you can think of the problem, Internetworking Troubleshooting Handbook probably has the solution--at least when it comes to networking problems. This 714-page tome is absolutely phenomenal in scope. Though you may not find in-depth scholarly discussions of networking woes, you will find pragmatic tips that can help you through an...
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Cisco Router Configuration, Second Edition
Cisco Router Configuration, Second Edition
The objective of this book is to help you, the novice Cisco users, with the basic administration of your internetworking devices. Using straightforward case studies and practical examples, Cisco Router Configuration, 2E teaches IOS fundamentals for configuring, operating, and maintaining internetworking devices....
Development of Novel Anti-HIV Pyrimidobenzothiazine Derivatives (Springer Theses)
Development of Novel Anti-HIV Pyrimidobenzothiazine Derivatives (Springer Theses)

The author successfully developed novel anti-HIV PD 404182 derivatives that exhibited submicromolar inhibitory activity against both HIV-1 and HIV-2. His thesis is in three parts. The first part expounds efficient methods for the synthesis of tricyclic heterocycles related to PD 404182 based on the...

Seven Web Frameworks in Seven Weeks: Adventures in Better Web Apps (Pragmatic Programmers)
Seven Web Frameworks in Seven Weeks: Adventures in Better Web Apps (Pragmatic Programmers)

Whether you need a new tool or just inspiration, Seven Web Frameworks in Seven Weeks explores modern options, giving you a taste of each with ideas that will help you create better apps. You'll see frameworks that leverage modern programming languages, employ unique architectures, live client-side instead of server-side, or embrace...

Result Page: 8 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy