Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
How Mathematicians Think: Using Ambiguity, Contradiction, and Paradox to Create Mathematics
How Mathematicians Think: Using Ambiguity, Contradiction, and Paradox to Create Mathematics
To many outsiders, mathematicians appear to think like computers, grimly grinding away with a strict formal logic and moving methodically--even algorithmically--from one black-and-white deduction to another. Yet mathematicians often describe their most important breakthroughs as creative, intuitive responses to ambiguity, contradiction, and...
The Talent Code: Greatness Isn't Born. It's Grown. Here's How.
The Talent Code: Greatness Isn't Born. It's Grown. Here's How.

What is the secret of talent? How do we unlock it? In this groundbreaking work, journalist and New York Times bestselling author Daniel Coyle provides parents, teachers, coaches, businesspeople—and everyone else—with tools they can use to maximize potential in themselves and others.

Whether you’re coaching
...

Mac OS X Snow Leopard Bible
Mac OS X Snow Leopard Bible

Tame the very latest Mac OS X cat, Snow Leopard 10.6

Snow Leopard moves faster and roars louder than its predecessor, and this comprehensive guide shows you all the ways to get the most out of this powerful new cat. Explore everything from its muscular handling of applications and streaming media to its new, game-changing support...

iPhone Secrets
iPhone Secrets

A top tech blogger takes you behind the scenes for an in-depth look at the iPhone

The world’s love of the iPhone only continues to grow by leaps and bounds. Darren Murph, managing editor of Engadget and a Guinness World Record holder as the most prolific blogger, explores every amazing capability of the iPhone and...

Servant-Leadership Across Cultures:  Harnessing the Strengths of the World's Most Powerful Management Philosophy
Servant-Leadership Across Cultures: Harnessing the Strengths of the World's Most Powerful Management Philosophy

We are all under new pressure to produce more for less money—and in less time. Ultimately, this cannot be done unless bosses are able to—in service of their organization—bring out the best in their people.

That is the essence of servant-leadership, the management philosophy originally outlined by organizational...

Foundations of Cryptography: A Primer (Foundations and Trends in Theoretical Computer Science,)
Foundations of Cryptography: A Primer (Foundations and Trends in Theoretical Computer Science,)
The vast expansion and rigorous treatment of cryptography is one of the major achievements of theoretical computer science. In particular, concepts such as computational indistinguishability, pseudorandomness and zero-knowledge interactive proofs were introduced, classical notions such as secure encryption and unforgeable signatures were placed on...
The Outlaws: A Presidential Agent Novel
The Outlaws: A Presidential Agent Novel

The #1 New York Times-bestselling series returns-and the stakes have never been higher.

Charlie Castillo's secret unit has been disbanded-but that doesn't mean he's out of business. As experience has painfully shown him, there are many things the intelligence community can't do, won't do, or
...

DVD Confidential 2: The Sequel (Consumer)
DVD Confidential 2: The Sequel (Consumer)
Unlock the hidden Easter eggs in your favorite DVDs including like hidden bloopers, alternate endings, and video games. Plus, sharpen your movie knowledge with hundreds of sidebars on your favorite films, from Citizen Kane and Casablanca to the Matrix Revisited.

Your Map to the DVD Easter Egg Hunt of a Lifetime

Love movies?...

Beginning ASP.NET Security (Wrox Programmer to Programmer)
Beginning ASP.NET Security (Wrox Programmer to Programmer)

Programmers: protect and defend your Web apps against attack!

You may know ASP.NET, but if you don't understand how to secure your applications, you need this book. This vital guide explores the often-overlooked topic of teaching programmers how to design ASP.NET Web applications so as to prevent online thefts and...

Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications,...

How to Make Money With Real Estate Options: Low-Cost, Low-Risk, High-Profit Strategies for Controlling Undervalued Property....
How to Make Money With Real Estate Options: Low-Cost, Low-Risk, High-Profit Strategies for Controlling Undervalued Property....
Spend like a miser, profit like a mogul

Who says you have to spend money to make money?Savvy real estate investors follow the examples of Donald Trump and Walt Disney, turning substantial profits on properties without incurring the debt, risk, and maintenance costs of ownership--and now, so can you!

In How to
...
My New iPad: A User's Guide (3rd Edition) (My New... (No Starch Press))
My New iPad: A User's Guide (3rd Edition) (My New... (No Starch Press))
There’s an old story about blind men examining an elephant. Based on what they feel, each man concludes that the elephant is something completely different—one man believes the elephant is a tree, another man a snake, the third a wall. When you first share your iPad with your family and...
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy