Search alternatives:
toru » tor (Expand Search), torn (Expand Search), tou (Expand Search)
torus » tors (Expand Search), torns (Expand Search), tous (Expand Search), terus (Expand Search)
tour » our (Expand Search), four (Expand Search), hour (Expand Search)
your » our (Expand Search), four (Expand Search), you (Expand Search)
turn » urn (Expand Search)
toru » tor (Expand Search), torn (Expand Search), tou (Expand Search)
torus » tors (Expand Search), torns (Expand Search), tous (Expand Search), terus (Expand Search)
tour » our (Expand Search), four (Expand Search), hour (Expand Search)
your » our (Expand Search), four (Expand Search), you (Expand Search)
turn » urn (Expand Search)
-
221
The PSYCHOLOGY OF PERSUASION /
Published 2005“…Read this book and you will learn how to: • Influence others to your way of thinking • Read the body of language other people in a split second • Create rapport in seconds with almost anyone • Learn how to predict the behavior of other people with accuracy •Discover what other people really want and need •Help others see you as the answer to their problems…”
text -
222
POWER TO CHOOSE /
Published 1991“…Here is a book about power. The POWER TO CHOOSE the life you want. …”
text -
223
PhD: The Amazing Journey - Volume 4
Published 2024“…Mohd Hanafiah Ahmad, for the support given that enables this book to be published successfully. Our undying gratitude echoes towards our 12 esteemed authors; your remarkable stories form vibrantly on this literary canvas. …”
Get full text
Get full text
Edited book -
224
Thematic Analysis : A Practical Guide /
Published [202“…Building on the success of Braun & Clarke's 2006 paper first outlining their approach which has over 100,000 citations on Google Scholar - this book is the definitive guide to TA and your support system throughout your TA journeys. …”
Get full text
Get full text
software, multimedia -
225
Ethical Hacking Workshop : Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity /
Published 2023“…By the end of the book, you'll be well-versed in ethical hacking and equipped with the skills and knowledge necessary to safeguard your enterprise against cyber-attacks. …”
Get full text
Get full text
software, multimedia -
226
LATEX MADE SIMPLE /
Published 2018“…If you have not decided yet to which publishers you want to sent your article or book, you first typset it using the LATEX default's template. …”
text -
227
Afiksasi verba dalam bahasa Indonesia
Published 2023“…Verbal affixation of Bahasa Indonesia (Indonesian [BI]) has been widely discussed in every Indonesian grammar book and theoretical kinds of literature. However, so far, the discussion of the quantitative distribution of BI verbal affixation is still lacking. …”
Book section -
228
BLUE OCEAN SHIFT : BEYOND COMPETING - PROVEN STEPS TO INSPIRE CONFIDENCE AND SEIZE NEW GROWTH /
Published 2017“…You'll learn what works, what doesn't, and how to avoid the pitfalls along the way. This book will empower you to succeed as you embark on your own blue ocean journey. …”
Get full text
software, multimedia -
229
Growing Roses /
Published 2019“…Divided into logical classification and examples, how to choose which roses to grow based on climate and location, designing your flower beds, companions to grow with your roses, buying and planting, and caring for your roses, as well as a handy Calendar of Care, you will discover their versatility and potential. …”
text -
230
Inequality and the 1%
Published 2014“…Even before birth, being born outside the 1% will have dramatic impact on the rest of your life: it will reduce your life expectancy, educational and work prospects, as well as your mental health. …”
Book -
231
Mobile application for outdoor augmented reality
Published 2017“…The main objective of the Final Year Project Report is to provide a comprehensive idea on the mobile application named “Botanic Tour” featuring outdoor augmented reality (AR), and its supportive sections. …”
Get full text
Final Year Project (FYP) -
232
EFFECTIVE THREAT INVESTIGATION FOR SOC ANALYSTS : The ultimate guide to examining various threats and attacker techniques using security logs /
Published 2023“…It's a crucial skill for SOC analysts, enabling them to analyze different threats and identify security incident origins. This book provides insights into the most common cyber threats and various attacker techniques to help you hone your incident investigation skills. …”
Get full text
Get full text
software, multimedia -
233
Value Proposition Design : How to create products and services customers want. Get started with.../
Published 2014“…Practical exercises, illustrations and tools help you immediately improve your product, service, or new business idea. In addition the book gives you exclusive access to an online companion on Strategyzer.com…”
text -
234
Exploratory study of undergraduates' perceptions on the Internet marketing strategies of travel agencies.
Published 2008“…This research was carried out to determine the effectiveness of tour package webpages as a marketing tool among undergraduates. …”
Get full text
Final Year Project (FYP) -
235
Beginning IoT Projects : Breadboard-less Electronic Projects /
Published 2021“…There is also a short tutorial on programming each host; Arduino C-like sketches and Python scripts respectfully. Thus, the book also helps you get started with your choice of platform. …”
text -
236
PhD: The Amazing Journey - Volume 3
Published 2024“…Be inspired and may this little book be your trusted companion during your trials and turbulences. …”
Get full text
Get full text
Edited book -
237
The Whole Picture : The colonial story of the art in our museums... and why we need to talk about it /
Published 2020“…The book is divided into four chronological sections, named after four different kinds of art space: The Palace; The Classroom; The Memorial; The Playground. …”
Get full text
software, multimedia -
238
How to Get from Where You Are to Where You Want to Be : THE 25 PRINCIPLES OF SUCCESS /
Published 2007“…Within minutes of reading this book you will want - and be able - to apply its clear, direct and highly effective principles to your own life. …”
text -
239
Exploring the nexus between healthcare tourism services and tourists’ behavioural intentions in Penang: A comprehensive analysis
Published 2023“…Through semi-structured interviews with five tourists who sought medical tour services in Penang, this study uncovered a multifaceted landscape. …”
Article -
240
Quantum Computing for Dummies /
Published 2023“…This easy-to-understand book breaks it down and answers your most pressing questions. …”
Get full text
Get full text
software, multimedia