Home | Amazing | Today | Tags | Publishers | Years | Search 
Never Threaten to Eat Your Co-Workers: Best of Blogs
Never Threaten to Eat Your Co-Workers: Best of Blogs

Do you occasionally wonder,

  • What kind of person works at a porn video store?
  • Do public defenders believe in their clients?
  • What does a reporter feel when he visits war-torn Iraq?
  • What happens after a child star falls into obscurity?

Thanks to Web logs, or...

One Simple Idea: Turn Your Dreams into a Licensing Goldmine While Letting Others Do the Work
One Simple Idea: Turn Your Dreams into a Licensing Goldmine While Letting Others Do the Work

Turn your one simple idea into millions―without lifting a finger!

“Ever heard of Teddy Ruxpin or Lazer Tag? Both have Stephen Key’s mark on them. He is the Yoda or ‘renting’ ideas for serious passive income. From how-to to war stories, this is a great book.”
―Tim Ferriss, author
...

High Performance Python: Practical Performant Programming for Humans
High Performance Python: Practical Performant Programming for Humans

Your Python code may run correctly, but you need it to run faster. By exploring the fundamental theory behind design choices, this practical guide helps you gain a deeper understanding of Python’s implementation. You’ll learn how to locate performance bottlenecks and significantly speed up your code in high-data-volume...

The Technical and Social History of Software Engineering
The Technical and Social History of Software Engineering

“Capers Jones has accumulated the most comprehensive data on every aspect of software engineering, and has performed the most scientific analysis on this data. Now, Capers performs yet another invaluable service to our industry, by documenting, for the first time, its long and fascinating history....

Any Way You Slice It: The Past, Present, and Future of Rationing
Any Way You Slice It: The Past, Present, and Future of Rationing
Rationing: it’s a word—and idea—that people often loathe and fear. Health care expert Henry Aaron has compared mentioning the possibility of rationing to “shouting an obscenity in church.” Yet societies in fact ration food, water, medical care, and fuel all the time, with those who can pay the most getting the most. As...
Mastering Gradle
Mastering Gradle

Master the technique of developing, migrating, and building automation using Gradle

About This Book

  • Create new plugins to get customized features to suit your needs
  • Build projects like Java, Scala, and web applications using Gradle
  • A step-by-step guide that will help you to...
Allied Fighting Effectiveness in North Africa and Italy, 1942-1945 (History of Warfare)
Allied Fighting Effectiveness in North Africa and Italy, 1942-1945 (History of Warfare)

Allied Fighting Effectiveness is a collection of scholarly papers focusing on a variety of different aspects of the major campaigns of North Africa, Sicily and Italy, ranging from operation TORCH to the end of the war in Europe.

...
The Anatomy of Peace: Resolving the Heart of Conflict
The Anatomy of Peace: Resolving the Heart of Conflict

NEW EDITION, REVISED AND UPDATED

What if conflicts at home, conflicts at work, and conflicts in the world stem from the same root cause?

What if we systematically misunderstand that cause?

And what if, as a result, we systematically perpetuate the very problems we think we are
...

Mobilizing Money: How the World's Richest Nations Financed Industrial Growth (Japan-US Center UFJ Bank Monographs on International Financial Markets)
Mobilizing Money: How the World's Richest Nations Financed Industrial Growth (Japan-US Center UFJ Bank Monographs on International Financial Markets)

This book examines the origins of modern corporate finance systems during the rapid industrialization period leading up to World War I. The study leads to three sets of conclusions. First, modern financial systems are rooted in the past, are idiosyncratic to specific countries, and are highly path-dependent. Therefore, to understand current...

Computer Science: A Very Short Introduction (Very Short Introductions)
Computer Science: A Very Short Introduction (Very Short Introductions)

Over the past sixty years, the spectacular growth of the technologies associated with the computer is visible for all to see and experience. Yet, the science underpinning this technology is less visible and little understood outside the professional computer science community. As a scientific discipline, computer science stands alongside the...

Cyber Warfare, Second Edition: Techniques, Tactics and Tools for Security Practitioners
Cyber Warfare, Second Edition: Techniques, Tactics and Tools for Security Practitioners

Cyber Warfare explores the battlefields, participants and tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and...

Routledge Handbook of Surveillance Studies (Routledge International Handbooks)
Routledge Handbook of Surveillance Studies (Routledge International Handbooks)

Surveillance is a central organizing practice. Gathering personal data and processing them in searchable databases drives administrative efficiency but also raises questions about security, governance, civil liberties and privacy. Surveillance is both globalized in cooperative schemes, such as sharing biometric data, and localized in the...

Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy