Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Camping Grounds: Public Nature in American Life from the Civil War to the Occupy Movement
Camping Grounds: Public Nature in American Life from the Civil War to the Occupy Movement
An exploration of the hidden history of camping in American life that connects a familiar recreational pastime to camps for functional needs and political purposes.

Camping appears to be a simple proposition, a time-honored way of getting away from it all. Pack up the car and hit the road in search of a
...
Gun Camera - World War II: Photography from Allied Fighters and Bombers over Occupied Europe
Gun Camera - World War II: Photography from Allied Fighters and Bombers over Occupied Europe
The air war over occupied Europe and Nazi Germany is illustrated from the unique and dramatic point of view of gun cameras mounted on Allied aircraft. The story begins as American bombers fall prey to Nazi flak and fighters and continues through the recapture of European skies as seen from American P-51 Mustangs and P-47 Thunderbolts and British...
The Engines of Our Ingenuity: An Engineer Looks at Technology and Culture
The Engines of Our Ingenuity: An Engineer Looks at Technology and Culture
A million people hear John H. Lienhard's radio program "The Engines of Our Ingenuity." In this fascinating book, Lienhard has gathered together his reflections on the nature of technology, culture, human inventiveness, and the history of engineering. The book brims with insightful observations, offering an intriguing glimpse into...
Pro SpringSource dm Server
Pro SpringSource dm Server
The SpringSource dm Server™ is a completely modular, OSGi-based Java server designed to run enterprise Java applications and Spring-powered applications with a new degree of flexibility and reliability. The SpringSource dm Server is based on the new SpringSource Dynamic Module Kernel™ (dm Kernel). The dm Kernel provides a module-based...
Routledge Handbook of Public Diplomacy
Routledge Handbook of Public Diplomacy

The Routledge Handbook of Public Diplomacy provides a comprehensive overview of public diplomacy and national image and perception management, from the efforts to foster pro-West sentiment during the Cold War to the post-9/11 campaign to "win the hearts and minds" of the Muslim world. Editors Nancy Snow and Philip Taylor...

Defend I.T. : Security by Example
Defend I.T. : Security by Example

The battle between IT professionals and those who use the Internet for destructive purposes is raging-and there is no end in sight. Reports of computer crime and incidents from the CERT Coordination Center at Carnegie Mellon University more than double each year and are expected to rise. Meanwhile, viruses and worms continue to...

Practical Criminal Investigations in Correctional Facilities
Practical Criminal Investigations in Correctional Facilities
The felonious activities of confined inmates reach out into society every day. These inmates run lucrative drug operations, commit fraud, hire contract murders, and commit a multitude of criminal offenses from inside the walls of our prisons. Practical Criminal Investigations in Correctional Facilities gives sound advice to both the long-time...
Panther vs T-34: Ukraine 1943 (Duel)
Panther vs T-34: Ukraine 1943 (Duel)

Robert A. Forczyk provides a riveting and intense description of the design and development of these two deadly opponents, the Panther and the T-34, analyzing their strengths and weaknesses and describing their tactics, weaponry and training. Moreover he gives an insight into the lives of the tank crews themselves, who were caught up in the...

Electricity And Magnetism (Physics in Our World)
Electricity And Magnetism (Physics in Our World)
THE NUCLEAR BOMBS that ended World War II in 1945 were a convincing and frightening demonstration of the power of physics. A product of some of the best scientific minds in  the world, the nuclear explosions devastated the Japanese cities of Hiroshima and Nagasaki, forcing Japan into an unconditional surrender. But even though the atomic bomb...
Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices
Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the...

The Hunt for Mount Everest
The Hunt for Mount Everest

The height of Mt. Everest was first measured in 1850, but the closest any westerner got to Everest during the next 71 years, until 1921, was 40 miles. The Hunt for Mt. Everest tells the story of the 71-year quest to find the world's highest mountain. It's a tale of high drama, of larger-than-life characters-George...

Deploying .NET Applications: Learning MSBuild and ClickOnce (Expert's Voice in .Net)
Deploying .NET Applications: Learning MSBuild and ClickOnce (Expert's Voice in .Net)

Whether building a console application, a web service, or a smart client, you eventually need to distribute your finished work. Deploying .NET Applications is a complete guide to delivering applications built with .NET. Packed with hands-on guidance, practical examples, and war stories from the authors' many experiences with deployment...

unlimited object storage image
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy