 |
|
 E: The Story of a NumberMaor attempts to give the irrational number e its rightful standing alongside pi as a fundamental constant in science and nature; he succeeds very well.... Maor writes so that both mathematical newcomers and long-time professionals alike can thoroughly enjoy his book, learn something new, and witness the ubiquity of mathematical ideas in... |  |  |  |  Final Cut Pro 3 Editing Workshop (2nd Edition)Go beyond the mechanics of Final Cut Pro 3 - learn how to edit with it! More than a button-pushing manual - this editing workshop gives you firsthand experience with the art and technique of editing with Final Cut Pro 3(FCP). It includes in-depth i
Final Cut Pro 3 Editing Workshop goes beyond the mechanics of Final Cut... |
|
|
 The Physics of SuperheroesIf superheroes stepped off the comic book page or silver screen and into reality, could they actually work their wonders in a world constrained by the laws of physics? How strong would Superman have to be to “leap tall buildings in a single bound”? Could Storm of the X-Men possibly control the weather? And how many cheeseburgers would... |  |  Internet Marketing: Strategy, Implementation and Practice (3rd Edition)This book is a comprehensive guide to how organizations can use the internet to support their marketing activities and covers all aspects of Internet marketing - environment analysis, strategy development and implementation. Building on the successful and widely regarded first edition, this second edition has a completely revised structure and... |  |  Encyclopedia of Islam & the Muslim WorldA growing number of scholars and pundits have declared that the twenty-first century will be the era of Islam. Such predictions, whether intended in a positive or negative light, err in failing to appreciate the spread and influence of Islam during the past millennium and a half, especially on the continents of Asia and Africa. Nonetheless, events... |
|
 Security of e-Systems and Computer NetworksE-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of... |  |  |  |  |
|
Result Page: 128 127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 |