When James Chandler keys in his security code and enters his front door one morning, he thinks it is just another day. As he watches his wife and daughter scream in terror, James has no idea that he d
When James Chandler keys in his security code and enters his front door one morning, he thinks it is just another day. As he watches his wife and daughter scream in terror, James has no idea that he d
"Ours is not to reason why, ours is but to do and die." That's pretty much mercenary code. When you hunt supernatural beasties for a living you've got to expect a hospital bed every now and then. But
A bestselling, Harvard-bred humorist plans to knock out a slapdash, quick-buck parody of a wildly successful, head-spinning, clue-laden thriller in a flagrant attempt to cash in on the publishing sens
If you've ever tried a trendy new diet and found it impossible to stick to.... If you've wondered why the steak-and-salad regimen that worked miracles for your friend actually put three unwanted pound
"It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are o
It's a four letter word and it's everywhere - it's mold. And, while we can't live without it, we have to know how to live with it. For instance, in nature, mold plays a key role, but problems begin wh
A solitary aviator checks his instruments before taking off on a flight that will mean glory or, more likely, death. A fearless war correspondent relies upon the kindness of strangers to pursue her ne
Lee Dunway, a hardened CIA undercover agent receives a frantic call from his ex-wife Julie informing him that their young daughter, Gail, has been kidnapped. Julie was warned not to notify the FBI or
November 22nd, 2003. CIA Headquarters, Langley, Virginia: LEE DUNWAY the CIA's best undercover agent receives a frantic call from his ex-wife JULIE. Following her divorce form Lee twelve years earlier
When it comes to the defensive use of firearms, the skill of not being shot is at least as important as the skill of shooting. Moving to cover and shooting from cover should be a constant part of Hand
When it comes to the defensive use of firearms, the skill of not being shot is at least as important as the skill of shooting. Moving to cover and shooting from cover should be a constant part of Hand
Have you ever seen an angel? Have you ever had a dog? If so, then you have seen an angel. Author Jeri K. Miller shows us how to recognize the angels who are our furry friends. Angels are funny and ent
Science is urgently challenging all humanity to change, to shift our thinking and our way of being in the world; to co-create a new, sustainable future or become extinct. Scripture's greatest message-
Science is urgently challenging all humanity to change, to shift our thinking and our way of being in the world; to co-create a new, sustainable future or become extinct. Scripture's greatest message-
As part of the Danish Resistance during World War II, Jesper fights the German occupiers through the Resistance press and through sabotage, but when he is captured, he finds himself the prisoner of hi
This book enables you to unleash the entertainment potential of your Windows 10 PC, tablet, or phone—or any combination of the three! Learn how to stream movies and TV shows, manage your media collect
This book includes the original, peer reviewed research from the 3rd International Conference on Intelligent Technologies and Engineering Systems (ICITES2014), held in December, 2014 at Cheng Shiu Uni
This book presents state-of-the-art research and case studies on new approaches to the design, construction and planning of our cities. Emphasis is placed on the role of alternative and renewable ener
This book tells the story of the four missions to maintain Hubble's successful operation. Between 1997 and 2009 these repaired, serviced and upgraded the instruments on the telescope to maintain its s
Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps ar