Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Questions I Am Asked About The Holocaust
Questions I Am Asked About The Holocaust

One of the few remaining living Holocaust survivors answers the questions children ask her

“There are no stupid questions, nor any forbidden ones, but there are some questions that have no answer.”

Hédi Fried was nineteen when the Nazis snatched her family from their home...

Post-War Eugenics, Reproductive Choices and Population Policies in Greece, 1950s–1980s
Post-War Eugenics, Reproductive Choices and Population Policies in Greece, 1950s–1980s
This book sheds light on the history of Greek eugenics during the post-war period. At this time, eugenics had already been condemned by international declarations. Alexandra Barmpouti, however, challenges the assumption that eugenics disappeared and confirms the continuity of eugenics after the Second World War. She looks at the Greek...
Matrix and Tensor Calculus: With Applications to Mechanics, Elasticity and Aeronautics
Matrix and Tensor Calculus: With Applications to Mechanics, Elasticity and Aeronautics
This volume is based on a series of lectures on matrix calculus and tensor calculus, and their applications, given under the sponsorship of the Engineering, Science, and Management War Training (ESMWT) program, from August 1942 to March 1943. The group taking the course included a considerable number of outstanding research engineers and directors...
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hackers eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the worlds foremost true hackers unleash the power of OS X for everything form cutting edge research...
The Polar Bear Expedition: The Heroes of America's Forgotten Invasion of Russia, 1918-1919
The Polar Bear Expedition: The Heroes of America's Forgotten Invasion of Russia, 1918-1919

In the brutally cold winter of 1919, 5,000 Americans battled the Red Army 600 miles north of Moscow. We have forgotten. Russia has not.

"AN EXCELLENT BOOK." —Wall Street Journal • "INCREDIBLE." — John U. Bacon •...

Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
"Few false ideas have more firmly gripped the minds of so many intelligent men than the one that, if they just tried, they could invent a cipher that no one could break," writes David Kahn in this massive (almost 1,200 pages) volume. Most of The Codebreakers focuses on the 20th century, especially World War II. But its reach is...
The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness
The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness
I graduated from Long Island University in 1991 with a bachelor’s degree in political science. In the years since, much of the specifi c material I learned has been forgotten in the whirlwind of family and career life. Even so, there are some important lessons I still recall. Dr. Donald Baker often told us undergraduate students that states...
Big Think Strategy: How to Leverage Bold Ideas and Leave Small Thinking Behind
Big Think Strategy: How to Leverage Bold Ideas and Leave Small Thinking Behind

Business leaders need bold strategies to stay relevant and win. In "Big Think Strategy", Schmitt shows how to bring bold thinking into your business by sourcing big ideas and executing them creatively. With the tools in this book, any leader can overcome institutionalized 'small think' - the inertia, the narrow-mindedness,...

Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
Behold a Pale Horse
Behold a Pale Horse
Sometime ago I had the opportunity to meet William Cooper and his wife Annie. It was part of my job to verify whether this man did indeed speak the truth or was just another person seeking fame and fortune. What I found was a rugged, bulldog, driven individual who was kind, thoughtful and tenderhearted. He was truly concerned about you and your...
Iran and Nuclear Weapons: Protracted Conflict and Proliferation (Routledge Global Security Studies)
Iran and Nuclear Weapons: Protracted Conflict and Proliferation (Routledge Global Security Studies)

This book investigates what is driving Iran's nuclear weapons programme in a less-hostile regional environment, using a theory of protracted conflicts to explicate proliferation.

Iran’s nuclear weapons program has alarmed the international community since the 1990s, but has come to the forefront of international security...

unlimited object storage image
Result Page: 39 38 37 36 35 34 33 32 31 30 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy