Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
The Art of Speedreading People: Harness the Power of Personality Type and Create What You Want in Business and in Life
The Art of Speedreading People: Harness the Power of Personality Type and Create What You Want in Business and in Life

From the bestselling authors of "Do What You Are" comes a revolutionary new tool--based on the same scientifically validated Personality Type model used by many Fortune 500 companies--designed to help readers effectively harness the power of their own personality types Web site promo. Print ads .

...
New Cambridge Advanced English Student's book
New Cambridge Advanced English Student's book

New Cambridge Advanced English is the revised and updated edition of the popular Cambridge Advanced English. The course has been completely redesigned in full colour and its stimulating reading and listening extracts have been supplemented with new authentic reading texts and interviews. Theme units, providing practice in spoken and written...

Matrix Algorithms, Volume I
Matrix Algorithms, Volume I
This book, Basic Decompositions, is the first volume in a projected five-volume series entitled Matrix Algorithms. The other four volumes will treat eigensystems, iterative methods for linear systems, sparse direct methods, and special topics, including fast algorithms for structured matrices.

My intended audience is the nonspecialist
...
TCP/IP: architecture, protocols, and implementation with IPv6 and IP security
TCP/IP: architecture, protocols, and implementation with IPv6 and IP security
TCP/IP by Sidnie Feit has sold over 20,000 copies in its previous two editions. We want to capitalize on their success with an updated paperback edition called "The Signature Edition." The Signature Series is reserved for our top selling communications authors that have established themselves as the authorities in computer communications....
Fighting Computer Crime: A New Framework for Protecting Information
Fighting Computer Crime: A New Framework for Protecting Information

Who are the cybercriminals and what can we do to stop them? From the #1 cybercrime expert, a revolutionary new approach to . Fighting Computer Crime A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during...

Gsm and Personal Communications Handbook (Artech House Mobile Communications Library)
Gsm and Personal Communications Handbook (Artech House Mobile Communications Library)
Here is the most comprehensive reference available on GSM applications and services that?s intended to build on -- not replace -- the basic technical information in the authors? original bestseller, An Introduction to GSM. The book provides a close-up look at this hot technology, offers in-depth discussions of the features and services available...
An Introduction to Genetic Algorithms (Complex Adaptive Systems)
An Introduction to Genetic Algorithms (Complex Adaptive Systems)
Science arises from the very human desire to understand and control the world. Over the course of history, we
humans have gradually built up a grand edifice of knowledge that enables us to predict, to varying extents, the
weather, the motions of the planets, solar and lunar eclipses, the courses of diseases, the rise and fall of...
GSM Networks: Protocols, Terminology and Implementation
GSM Networks: Protocols, Terminology and Implementation
Someone who wants to get to know the customs of a country frequently
receives the advice to learn the language of that country. Why? Because the differences
that distinguish the people of one country from those of another are
reflected in the language. For example, the people of the islands of the Pacific
do not have a term for
...
KC's Problems and Solutions for Microelectronic Circuits, Fourth Edition
KC's Problems and Solutions for Microelectronic Circuits, Fourth Edition

One of the most enduring trademarks of Microelectronic Circuits, by Adel Sedra and KC Smith, has been its wealth of problems and solutions. This manual includes hundreds of extra problems and solutions of varying degrees of difficulty for student review. The solutions are completely worked out to facilitate self-study. KC Smith has...

Illustrated TCP/IP: A Graphic Guide to the Protocol Suite
Illustrated TCP/IP: A Graphic Guide to the Protocol Suite
With the amount of information we are forced to consume everyday, it would be nice to simply skim over a few sentences in a paragraph to get the key points of the topic. That is what the Illustrated Network books are about. Each page has a graphic and concise text that makes key points quick to learn and review.     ...
The Complete Idiot's Guide to Managing Your Money
The Complete Idiot's Guide to Managing Your Money
The Complete Idiot's Guide to Managing Your Money shows that any numbskull can master personal finance. In this second edition, a father-and-daughter writing team, Robert K. Heady and Christy Heady, give readers the best advice culled from their many years of experience in consumer rights and money management. The Headys believe that...
Essential COM (DevelopMentor Series)
Essential COM (DevelopMentor Series)
The Component Object Model (COM) is deep and extremely difficult, making it impossible to grasp the ideas behind this specification quickly or easily. Don Box, the author of Essential COM concedes that it took him six months of reading documentation, writing programs, and experiencing general puzzlement before he had his personal COM...
Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next 
©2017 LearnIT (support@pdfchm.net) - Privacy Policy