Home | Amazing | Today | Tags | Publishers | Years | Search 
Where Men Hide
Where Men Hide
"If you ask men if they spend any time hiding, they usually look at you as if you're nuts. 'What, me hide?' But if you ask women whether men hide, they immediately know what you mean." -- from Where Men Hide

Where Men Hide is a spirited tour of the dark and often dirty places men go to find comfort, camaraderie,...

Designing Visual Interfaces: Communication Oriented Techniques
Designing Visual Interfaces: Communication Oriented Techniques
An excellent introduction to the design theories involved in the creation of user interfaces. Instead of the usual examples and pictures of computer screens and application menus, Mullet approaches the concept of UI from its "outside world" roots. With examples ranging from street signs to corporate logos to the map of the London...
Daring Missions of World War II
Daring Missions of World War II

Few World War II stories are more gripping than those fought behind enemy lines by spies, underground members, and special forces.

In his latest collection, Daring Missions of World War II, popular author and distinguished historian William Breuer brings to light largely unknown stories of behind-the-scenes bravery and covert...

Australia For Dummies (Dummies Travel)
Australia For Dummies (Dummies Travel)
From the Outback to the Great Barrier Reef to glorious, sophisticated cities like Sydney, this guide helps you find the Australian adventures and attractions that are right for you, whether you’d like to cuddle a koala, explore a shipwreck, swim with whale sharks, or climb the Sydney Harbour Bridge. It gives you the scoop on:
Acoustic Diffusers and Absorbers: Theory, Design and Application
Acoustic Diffusers and Absorbers: Theory, Design and Application
Every book tells a story and there is a story behind every book. This story begins in 1980, in the conference room of the laboratory for the structure of matter at the Naval Research Laboratory (NRL) in Washington, DC, where Peter D’Antonio was employed as a diffraction physicist. Knowing Peter’s interest in music, a colleague handed...
American History Through Literature - 1820-1870
American History Through Literature - 1820-1870
This A-Z, cross-referenced and illustrated title provides a unique overview of the critical period that spans the early national era through the Civil War, and which witnessed the birth of a truly American literature. The set features more than 250 survey entries. Subjects include: political topics (Manifest Destiny, Underground Railroad); ideas in...
Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking
Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking
Complex and controversial, hackers possess a wily, fascinating talent, the machinations of which are shrouded in secrecy. Providing in-depth exploration into this largely uncharted territory, Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking offers insight into the hacking realm by telling...
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
Originally designed to sabotage or annihilate websites, computerized “Bots” are increasingly used in mass spamming events, fraud, extortion, identity theft, and software theft. Focusing on the malicious use of bots and bot herder means and motivations, Malicious Bots provides a much needed a resource for understanding...
Surface and Underground Excavations, 2nd Edition: Methods, Techniques and Equipment
Surface and Underground Excavations, 2nd Edition: Methods, Techniques and Equipment

Surface and Underground Excavations – Methods, Techniques and Equipment (2nd edition) covers the latest technologies and developments in the excavation arena at any locale: surface or underground. In the first few chapters, unit operations are discussed and subsequently, excavation techniques are described for various operations:...

2600: The Hacker Quarterly, Spring 2003
2600: The Hacker Quarterly, Spring 2003
2600: The Hacker Quarterly, Spring 2003

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet
...
2600: The Hacker Quarterly, Winter 2002-2003
2600: The Hacker Quarterly, Winter 2002-2003
2600: The Hacker Quarterly, Winter 2002-2003

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects
...
2600: The Hacker Quarterly, Summer 2002
2600: The Hacker Quarterly, Summer 2002
2600: The Hacker Quarterly, Summer 2002:

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well as
...
Result Page: 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy