智慧电子图书馆 本次搜索耗时 0.503 秒,为您找到 996 个相关结果.
  • High Performance Web Sites - Steve Souders

    Want to speed up your web site? This book presents 14 specific rules that will cut 20% to 25% off response time when users request a page. Author Steve Souders, in his job as Chief...
  • Hetty_ The Genius and Madness o - Charles Slack

    From BooklistHetty Green (1835-1916) was the only woman to make her mark in the financial markets during the Guilded Age of the late 1800s. She parlayed an inheritance of $500,000 ...
  • Her Mother's Hope - Francine Rivers

    SUMMARY: The first in an epic two-book saga by beloved author Francine Rivers, this sweeping story explores the complicated relationships between mothers and daughters over several...
  • Hell to Pay - Simon R. Green

    From Publishers WeeklyLady Damnation, Old Father Time, a world weary Count Dracula and the hard-drinking storybook character Bruin Bear are only a few of the beings that Green prod...
  • Heirs of the Blade_ Shadows of - Adiran Tchaikovsky

    Heirs of the Blade: Shadows of the Apt: Book Seven
  • Heart-shaped box - Joe Hill

    EDITORIAL REVIEW: Judas Coyne is a collector of the macabre: a cookbook for cannibals . . . a used hangman's noose . . . a snuff film. An aging death-metal rock god, his taste for ...
  • Have a Little Faith - Mitch Albom

    SUMMARY:'Will you do my eulogy?' With those words, Mitch Albom begins his return to non-fiction. In this book he gravitates to an inner-city pastor of a church that houses t...
  • Happily Ever After_ - Benison Anne O'Reilly

    Bestselling author Benison O'Reilly (co-author of 'Australian Autism Handbook') has turned her accurate eye and dry wit to the story of what happens after the fairytale wedding. Th...
  • Handbook of Psychological Asses - Gary Groth-Marnat

    Handbook of Psychological Assessment
  • Hacking_ The Art of Exploitatio - Jon Erickson

    While other books merely show how to run existing exploits, Hacking: The Art of Exploitation broke ground as the first book to explain how hacking and software exploits work and ho...