Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Communication, Interpreting and Language in Wartime: Historical and Contemporary Perspectives (Palgrave Studies in Languages at War)
Communication, Interpreting and Language in Wartime: Historical and Contemporary Perspectives (Palgrave Studies in Languages at War)

This edited book provides a multi-disciplinary approach to the topics of translation and cross-cultural communication in times of war and conflict. It examines the historical and contemporary experiences of interpreters in war and in war crimes trials, as well as considering policy issues in communication difficulties in war-related...

Between Two Kingdoms: A Memoir of a Life Interrupted
Between Two Kingdoms: A Memoir of a Life Interrupted
NEW YORK TIMES BESTSELLER • A searing, deeply moving memoir of illness and recovery that traces one young woman’s journey from diagnosis to remission to re-entry into “normal” life—from the author of the Life, Interrupted column in The New York Times

...
Application Acceleration and WAN Optimization Fundamentals
Application Acceleration and WAN Optimization Fundamentals
IT organizations face a number of increasing pressures to increase productivity, improve application performance, provide infrastructure conducive to global collaboration, improve posture toward data protection and compliance, and minimize costs across the board. These pressures come largely as a result of initiatives to increase availability and...
The Data Science Design Manual (Texts in Computer Science)
The Data Science Design Manual (Texts in Computer Science)

This engaging and clearly written textbook/reference provides a must-have introduction to the rapidly emerging interdisciplinary field of data science. It focuses on the principles fundamental to becoming a good data scientist and the key skills needed to build systems for collecting, analyzing, and interpreting data.

The...

The Scientific World of Karl-Friedrich Bonhoeffer: The Entanglement of Science, Religion, and Politics in Nazi Germany (Palgrave Studies in the History of Science and Technology)
The Scientific World of Karl-Friedrich Bonhoeffer: The Entanglement of Science, Religion, and Politics in Nazi Germany (Palgrave Studies in the History of Science and Technology)
In twentieth-century Germany, Karl-Friedrich Bonhoeffer rose to prominence as a brilliant physical chemist, even as several of his relatives?Dietrich Bonhoeffer among them?became involved in the resistance to Hitler, leading to their executions. This book traces the entanglement of science, religion, and politics in the Third Reich and in...
Holy War, Holy Peace: How Religion Can Bring Peace to the Middle East
Holy War, Holy Peace: How Religion Can Bring Peace to the Middle East
Part I: Analysis 1. The Interaction between Religion and Culture in Peace and Conflict 2. Family Myths and Cultural Conflict 3. Political and Mythic Interdependencies 4. Patterns of Abrahamic Incrimination 5. Conflict, Injury, and Transformation Part II: Practical Applications 6. Patterns of Abrahamic Reconciliation: Act, Ritual, and Symbol as...
Shadows of War: Violence, Power, and International Profiteering in the Twenty-First Century (California Series in Public Anthropology, 10)
Shadows of War: Violence, Power, and International Profiteering in the Twenty-First Century (California Series in Public Anthropology, 10)
"This should be made into a movie!"-Katia Lund, Co-director of City of God "Carolyn Nordstrom destroys the categories through which we normally look at war. This is a major achievement. Her eyewitness reporting, when contrasted with the official histories later compiled of the same events, is a revelation. The amount of...
Seven Deadliest USB Attacks
Seven Deadliest USB Attacks

Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend...

The Elegant Warrior: How To Win Life's Trials Without Losing Yourself
The Elegant Warrior: How To Win Life's Trials Without Losing Yourself
"... contains plenty of valuable, adaptable life lessons to help readers through tricky situations... a template for achieving personal and career goals." 
Publishers Weekly

Can you win life's battles without losing yourself?

Life is full of trials, and sometimes you
...
Maximum Wireless Security
Maximum Wireless Security

Maximum Wireless Security is a practical handbook that reveals the techniques and tools crackers use to break into wireless networks, and that details the steps network administrators need to take to secure their systems.

The authors provide information to satisfy the expert's hunger for in-depth information with actual source code,...

Deciding Who Leads: How Executive Recruiters Drive, Direct, and Disrupt the Global Search for Leadership Talent
Deciding Who Leads: How Executive Recruiters Drive, Direct, and Disrupt the Global Search for Leadership Talent
Leadership recruiting and succession rank as the most pivotal agendas for today’s growth-minded, change-oriented organizations. Given the risks and rewards inherent in senior-management recruiting, deciding who leads is the quintessential challenge faced by boards of directors, senior corporate officers, and division or...
The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography
The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography

Codes have decided the fates of empires, countries, and monarchies throughout recorded history. Mary, Queen of Scots was put to death by her cousin, Queen Elizabeth, for the high crime of treason after spymaster Sir Francis Walsingham cracked the secret code she used to communicate with her conspirators. And thus the course of British history...

unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy