|
|
|
|
Relativity: The Special and the General Theory (Penguin Classics)
The Nobel Prize-winning scientist’s presentation of his landmark theory
According to Einstein himself, this book is intended "to give an exact insight into the theory of Relativity to those readers who, from a general scientific and philosophical point of view, are interested in the theory, but who are not... | | slide:ology: The Art and Science of Creating Great Presentations
Presentations have become the de facto business communication
tool. Companies are started, products are
launched, climate systems are saved—possibly based on
the quality of presentations. Likewise, ideas, endeavors,
and even careers can be cut short due to ineffective
communication. Out of the millions of presentations... | | Advanced Negotiation Techniques
Advanced Negotiation Techniques provides a wealth of material in a winning combination of practical experience and good research to give you a series of tools, techniques, and real-life examples to help you achieve your negotiation... |
|
PHP and MySQL for Dynamic Web Sites : Visual QuickPro Guide, Second EditionIt hasn't taken Web developers long to discover that when it comes to creating dynamic, database-driven Web sites, MySQL and PHP provide a winning open source combination. Add this book to the mix, and there's no limit to the powerful, interactive Web sites that users can create. With step-by-step instructions, complete scripts, and expert... | | Inside LightWave v9You hold in your hands the best-selling guide to NewTek's LightWave 3D animation software, completely updated for LightWave v9 by award-winning animator and trainer Dan Ablan. Rather than rehash the documentation like other books, this down-to-earth, easy-to-follow guide offers an invaluable set of project tutorials that teach you the ins and... | | Information Warfare: How to Survive Cyber Attacks"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust... |
|
|
|
|
Result Page: 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 |