Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Lonely Planet The Trans-Siberian Railway (Multi Country Guide)

Buy

“The Trans-Siberian routes are some of the greatest rail journeys of the world. Whichever one you choose, it’s a rewarding experience of changing landscapes and culture, people and of life on the rails.” – Anthony Haywood, Lonely Planet Writer

Our Promise

You can trust our travel information because Lonely Planet authors visit the places we write about, each and every edition. We never accept freebies for positive coverage so you can rely on us to tell it like it is.

Inside This Book…

8 authors
7 time zones
15,000+ km of railway track
Countless breathtaking vistas
Inspirational photos
Clear, easy-to-use maps
Comprehensive planning tools
Life on the Rails feature
In-depth background
Easy-to-read layout

(HTML tags aren't allowed.)

Trends in Manufacturing Processes: Select Proceedings of ICFTMM 2018 (Lecture Notes on Multidisciplinary Industrial Engineering)
Trends in Manufacturing Processes: Select Proceedings of ICFTMM 2018 (Lecture Notes on Multidisciplinary Industrial Engineering)
This book comprises select proceedings of the International Conference on Futuristic Trends in Materials and Manufacturing (ICFTMM 2018). The volume covers current research findings in conventional and non-conventional manufacturing processes. Different fabrication processes of polymer based materials and advanced materials are discussed in...
Deep Learning for Computer Vision: Expert techniques to train advanced neural networks using TensorFlow and Keras
Deep Learning for Computer Vision: Expert techniques to train advanced neural networks using TensorFlow and Keras

Learn how to model and train advanced neural networks to implement a variety of Computer Vision tasks

Key Features

  • Train different kinds of deep learning model from scratch to solve specific problems in Computer Vision
  • Combine the power of Python, Keras, and TensorFlow to...
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Communication between people has changed with the invention of the telephone. The ability to communicate across continents in real-time has also helped our society in several dimensions including entertainment, trade, finance, and defense. But this new capability did not come without an investment. Building an international telephony...


Data Mining & Statistical Analysis Using SQL
Data Mining & Statistical Analysis Using SQL

This book is not just another theoretical text about statistics or data mining. No, instead it is aimed for database administrators who want to use SQL or bolster their understanding of statistics to support data mining and customer relationship management analytics.

Each chapter is self-contained, with examples tailored to real...

Secure Your Node.js Web Application: Keep Attackers Out and Users Happy
Secure Your Node.js Web Application: Keep Attackers Out and Users Happy

Cyber-criminals have your web applications in their crosshairs. They search for and exploit common security mistakes in your web application to steal user data. Learn how you can secure your Node.js applications, database and web server to avoid these security holes. Discover the primary attack vectors against web applications, and implement...

Django 2 by Example: Build powerful and reliable Python web applications from scratch
Django 2 by Example: Build powerful and reliable Python web applications from scratch

Learn Django with four end-to-end projects

Key Features

  • Learn Django by building real-world web applications from scratch
  • Develop powerful web applications quickly using the best coding practices
  • Integrate other technologies into your application with clear,...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy