Home | Amazing | Today | Tags | Publishers | Years | Search 
Disarming Strangers
Disarming Strangers

In June 1994 the United States went to the brink of war with North Korea. With economic sanctions impending, President Bill Clinton approved the dispatch of substantial reinforcements to Korea, and plans were prepared for attacking the North's nuclear weapons complex. The turning point came in an extraordinary private diplomatic...

Digital Government: Technology and Public Sector Performance
Digital Government: Technology and Public Sector Performance

Few developments have had broader consequences for the public sector than the introduction of the Internet and digital technology. In this book, Darrell West discusses how new technology is altering governmental performance, the political process, and democracy itself by improving government responsiveness and increasing information available...

The Pythagorean Theorem: A 4,000-Year History
The Pythagorean Theorem: A 4,000-Year History

By any measure, the Pythagorean theorem is the most famous statement in all of mathematics, one remembered from high school geometry class by even the most math-phobic students. Well over four hundred proofs are known to exist, including ones by a twelve-year-old Einstein, a young blind girl, Leonardo da Vinci, and a future president of the...

The Green House: New Directions in Sustainable Architecture
The Green House: New Directions in Sustainable Architecture

From the arid deserts of Tucson, Arizona to the icy forests of Poori, Finland to the tropical beaches of New South Wales, Australia to the urban jungle of downtown Manhattan, critics Alanna Stang and Christopher Hawthorne have traveled to the farthest reaches of the globe to find all that is new in the design of sustainable, or...

Implementation of the Icon Programming Language (Princeton Series in Computer Science)
Implementation of the Icon Programming Language (Princeton Series in Computer Science)

Icon is a high-level, general-purpose programming language that offers a broad range of string- and list-processing facilities. It also has a novel expression evaluation mechanism and allows an unusual degree of run-time flexibility. Because of these features, implementing Icon presents problems considerably different from those involved with...

Algebraic Geometry in Coding Theory and Cryptography
Algebraic Geometry in Coding Theory and Cryptography

Algebraic geometry has found fascinating applications to coding theory and cryptography in the last few decades. This book aims to provide the necessary theoretical background for reading the contemporary literature on these applications. An aspect that we emphasize, as it is very useful for the applications, is the interplay between...

   
   
Result Page: 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy