Home | Amazing | Today | Tags | Publishers | Years | Search 
Leave Out the Tragic Parts: A Grandfather's Search for a Boy Lost to Addiction
Leave Out the Tragic Parts: A Grandfather's Search for a Boy Lost to Addiction
This extraordinary investigation of the death of the author's grandson yields a powerful memoir of addiction, grief, and the stories we choose to tell our families and ourselves.
 
Jared Kindred left his home and family at the age of eighteen, choosing to wander...
Jump-Starting America: How Breakthrough Science Can Revive Economic Growth and the American Dream
Jump-Starting America: How Breakthrough Science Can Revive Economic Growth and the American Dream
The untold story of how America once created the most successful economy the world has ever seen and how we can do it again.

The American economy glitters on the outside, but the reality is quite different. Job opportunities and economic growth are increasingly concentrated in a few crowded coastal enclaves.
...
The Big Nine: How the Tech Titans and Their Thinking Machines Could Warp Humanity
The Big Nine: How the Tech Titans and Their Thinking Machines Could Warp Humanity
A call-to-arms about the broken nature of artificial intelligence, and the powerful corporations that are turning the human-machine relationship on its head.

We like to think that we are in control of the future of "artificial" intelligence. The reality, though, is that we--the everyday...
The Secret Lives of Customers: A Detective Story About Solving the Mystery of Customer Behavior
The Secret Lives of Customers: A Detective Story About Solving the Mystery of Customer Behavior
A "detective story" that delivers key insights for any businessperson asking the questions: who really are our customers, why do we lose them, how do we regain them?

Customers can be a mystery. Despite the availability of more data than ever before, everyone, from the CEO to salespeople in the
...
The DevOps 2.1 Toolkit: Docker Swarm: Building, testing, deploying, and monitoring services inside Docker Swarm clusters (The DevOps Toolkit Series) (Volume 2)
The DevOps 2.1 Toolkit: Docker Swarm: Building, testing, deploying, and monitoring services inside Docker Swarm clusters (The DevOps Toolkit Series) (Volume 2)

The book envelops all aspects of building, testing, deploying, and monitoring services inside Docker Swarm clusters. We'll go through all the tools required for running a cluster. We'll go through the whole process with clusters running locally on a laptop. Once we are confident with the outcome, we'll translate the experience to...

The Knocked Up Plan
The Knocked Up Plan

There are three little words most guys don’t want to hear on the first date. Not those...I mean these... “knock me up.”
This single gal has had enough of the games, the BS and the endless chase. I know what I want most, and it’s not true love. It’s a bun in the oven,and I’m not afraid to hit
...

The SAGE Encyclopedia of Trans Studies
The SAGE Encyclopedia of Trans Studies
Transgender studies, broadly defined, has become increasingly prominent as a field of study over the past several decades, particularly in the last ten years. The experiences and rights of trans people have also increasingly become the subject of news coverage, such as the ability of trans people to access restrooms, their...
Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing
Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing

Cyber crime is the biggest threat that every organization on the planet faces today! And it’s not just the organizations that are vulnerable. People too are at risk of being targeted by hackers.

Inside this book we aim to show you the importance of staying on top of this threat by learning how to hack. While it...

Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Ever wonder how easy it is to hack into someone’s bank account info while surfing the net at your local Starbucks? Learning how to hack is one of the best preventative measures you can take when protecting yourself from other hackers. Hacking is often misunderstood and that is for good reason. Many people use hacking as...
Your Body Mandala: Posture as a Path to Presence
Your Body Mandala: Posture as a Path to Presence

In Your Body Mandala, Mary Bond, author of The New Rules of Posture, helps you unlock your somatic wisdom and find your way home to your body. With modern lifestyles that leave us feeling overwhelmed by mental and physical stress, being comfortably present inside our skins can be a challenge. Through an innovative...

Beginner's Guide to Android App Development: A Practical Approach for Beginners
Beginner's Guide to Android App Development: A Practical Approach for Beginners
This book covers Android app design fundamentals in Android Studio using Java programming language.

The author assumes you have no experience in app development. The book starts with the installation of the required development environment and setting up the emulators. Then, the simplest “Hello World” app is
...
Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)
Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)

## ## ## The Ultimate Guide to the 17 Most Dangerous Hacking Attacks ## ## ##

Do you want to learn about today's most sophisticated Hacking attacks?

Do you want to know more about Cyber criminals and their operations?

Do you want to learn about Robot Networks, Trojans &
...

Result Page: Previous 2252 2253 2254 2255 2256 2257 2258 2259 2260 2261 2262 2263 2264 2265 2266 2267 2268 2269 2270 2271 2272 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy