Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Deadline Fitness: Tone Up and Slim Down When Every Minute Counts
Deadline Fitness: Tone Up and Slim Down When Every Minute Counts

When I moved to Los Angeles from the East Coast, I was thrilled to have the opportunity to work in the entertainment industry. As I was studying and building my fitness business, my day job was as an assistant account executive at a Beverly Hills public relations firm. I spent lots of time with up-and-comers as well as with the most...

Investing Strategies for the High Net-Worth Investor: Maximize Returns on Taxable Portfolios
Investing Strategies for the High Net-Worth Investor: Maximize Returns on Taxable Portfolios

A proven model for achieving high returns on taxable investments

Investing Strategies for the High Net-Worth Investor showcases an investing approach that helps readers understand the unique challenges and opportunities that wealthy families face when building a diversified portfolio for multiple generations. Renowned...

The Pillars of Computation Theory: State, Encoding, Nondeterminism (Universitext)
The Pillars of Computation Theory: State, Encoding, Nondeterminism (Universitext)

The abstract branch of theoretical computer science known as Computation Theory typically appears in undergraduate academic curricula in a form that obscures both the mathematical concepts that are central to the various components of the theory and the relevance of the theory to the typical student. This regrettable situation is due largely...

Java Web Services: Up and Running
Java Web Services: Up and Running
This example-driven book offers a thorough introduction to Java's APIs for XML Web Services (JAX-WS) and RESTful Web Services (JAX-RS). Java Web Services: Up and Running takes a clear, pragmatic approach to these technologies by providing a mix of architectural overview, complete working code examples, and short yet precise instructions for...
Handbook of Fingerprint Recognition
Handbook of Fingerprint Recognition
From the reviews:

"...a useful reference for all biometric security professionals and researchers. The four coauthors have a distinguished combination of academic and professional experience....Overall, readers will be pleased with the style and substance of this book." -Computing Reviews

"This is a comprehensive reviews...

Spring Web Flow 2 Web Development
Spring Web Flow 2 Web Development

Many web applications need to take the user through a defined series of steps such as e-commerce checkouts or user registrations. Spring Web Flow works well for rich and flexible user interaction, additionally it helps you to describe the flow of websites in complex processes. Spring Web Flow 2 provides the perfect way to build these kinds of...

XML Retrieval (Synthesis Lectures on Information Concepts, Retrieval & Services)
XML Retrieval (Synthesis Lectures on Information Concepts, Retrieval & Services)
Documents usually have a content and a structure. The content refers to the text of the document, whereas the structure refers to how a document is logically organized. An increasingly common way to encode the structure is through the use of a mark-up language. Nowadays, the most widely used mark-up language for representing structure is the...
The Ethics of Computer Games
The Ethics of Computer Games
Despite the emergence of computer games as a dominant cultural industry (and the accompanying emergence of computer games as the subject of scholarly research), we know little or nothing about the ethics of computer games. Considerations of the morality of computer games seldom go beyond intermittent portrayals of them in the mass media as training...
Managing Security Overseas: Protecting Employees and Assets in Volatile Regions
Managing Security Overseas: Protecting Employees and Assets in Volatile Regions
Written by a Certified Protection Professional (CPP), Certified Fraud Examiner (CFE), and FBI recognized subject matter expert, Managing Security Overseas: Protecting Employees and Assets in Volatile Regions details the dos and don’ts of protecting people and assets in hostile global settings. The author, Scott Alan Ast,...
ASP.NET MVC 1.0 Website Programming: Problem - Design - Solution (Wrox Programmer to Programmer)
ASP.NET MVC 1.0 Website Programming: Problem - Design - Solution (Wrox Programmer to Programmer)
Perfectly suited to the innovative Problem Design Solution approach, ASP.NET MVC is a new development model that separates code for the data, look, and business processes of a Web site. This nuts-and-bolts guide thoroughly covers creating a Web site with MVC and discusses solving the most common problems that you may encounter when creating your...
The Hammer of Witches: A Complete Translation of the Malleus Maleficarum
The Hammer of Witches: A Complete Translation of the Malleus Maleficarum
The Malleus Maleficarum, first published in 1486-7, is the standard medieval text on witchcraft and it remained in print throughout the early modern period. Its descriptions of the evil acts of witches and the ways to exterminate them continue to contribute to our knowledge of early modern law, religion and society. Mackay's highly acclaimed...
Integrated Silicon Optoelectronics (Springer Series in Optical Sciences)
Integrated Silicon Optoelectronics (Springer Series in Optical Sciences)

Integrated Silicon Optoelectronics synthesizes topics from optoelectronics and microelectronics. The book concentrates on silicon as the major base of modern semiconductor devices and circuits. Starting from the basics of optical emission and absorption, as well as from the device physics of photodetectors, the aspects of the integration of...

Result Page: Previous 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy