Unauthorized
21J. D. Salinger: The Escape Artist , Thomas Beller (2014)
J. D. Salinger published his first story in The New Yorker at age twenty-nine. Three years later came The Catcher in The Rye, a novel that has sold more than sixty-five million copies and achieved… 759 руб22Repossessed , A. M. Jenkins (2009)
Don`t call me a demon. I prefer the term Fallen Angel. Everybody deserves a vacation, right? Especially if you have a pointless job like tormenting the damned. So who could blame me for blowing off… 894 грн (только Украина)23Final Fantasy and Philosophy. The Ultimate Walkthrough , William Irwin
An unauthorized look behind one of the greatest video game franchises of all time, Final Fantasy The Final Fantasy universe is packed with compelling characters and incredible storylines. In this… 1234.81 руб электронная книга24Madoff with the Money , Jerry Oppenheimer
An intriguing look at Bernie Madoff the man, and his scam Madoff with the Money is a deeply disturbing portrait of Bernie Madoff based on dozens of exclusive, news-making interviews. From the values… 1481.77 руб электронная книга25Heroes and Philosophy. Buy the Book, Save the World , William Irwin
The first unauthorized look at the philosophy behind Heroes, one of TV's most popular shows When ordinary individuals from around the world inexplicably develop superhuman abilities, they question… 1559.96 руб электронная книга26Wi-Fi Home Networking Just the Steps For Dummies , Keith Underdahl
Wi-Fi Home Networking Just the Steps For Dummies is the way to go if you’re ready to go wireless and install your own wireless home network. The book’s easy-to-navigate design features two… 1172.25 руб электронная книга27House and Philosophy. Everybody Lies , William Irwin
An unauthorized look at the philosophical issues raised by one of today's most popular television shows: House House is one of the top three television dramas on the air, pulling in more than 19… 1559.96 руб электронная книга28Hack Attacks Testing. How to Conduct Your Own Security Audit , John Chirillo
Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the… 3251.98 руб электронная книга29Blade Runner , Dick Philip K. (2017)
By 2021, the World War has killed millions, driving entire species into extinction and sending mankind off-planet. Those who remain covet any living creature, and for people who can’t afford one… 676 руб30Cyber-Assurance for the Internet of Things , Tyson Brooks T.
Presents an Cyber-Assurance approach to the Internet of Things (IoT) This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and… 9652.07 руб электронная книга