Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ultimate Journey

Buy
Ultimate Journey, 9780385472081 (0385472080), Three Rivers Press, 1994

In 1958, a successful businessman named Robert Mornroe began to have experiences that drastically altered his life.  Unpredictably, and without his willing it, Monroe found himself leaving his physical body to travel via a "second body" to locales far removed from the physical and spiritual realities of his life. He was inhabiting a place unbounded by life or death.

Monroe recorded these experiences in two bestselling, landmark books, Journeys Out of the Body and Far Journeys.  Ultimate Journey, his final and career-defining work, takes us further than we thought possible--and reveals to us what it all means.

Ultimate Journey charts that area which lies "over the edge," beyond the limits of the physical world. It presents us with a map of the "interstate"--the route that opens to us when we leave our physical lives, with their entry and exit ramps, their singposts and their hazards.  It also tells us how Monroe found the route and travelled it, and uncovered the reason and the purpose of this pioneering expedition.  It is a journey that reveals basic truths about the meaning and purpose of life--and of what lies beyond.

After six hardcover printings, the trade paperback edition of Ultimate Journey, will offer an even wider range of readers this exhilarating reading experience, the masterwork of one of the most daring and original thinkers and explorers of our time.

(HTML tags aren't allowed.)

Working with Windows Small Business Server 2011 Essentials
Working with Windows Small Business Server 2011 Essentials

Small businesses make up the economic engine that moves a nation forward, and all small businesses must deal with a highly competitive marketplace, unpredictable economic cycles, time pressures, and technological demands that are constantly exerting pressure on the bottom line.

Your business needs the same technologies that...

Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this...

VEE Pro: Practical Graphical Programming
VEE Pro: Practical Graphical Programming
With VEE 7.0 Trial Version on CD-ROM From the depths of the oceans to the deserts of Mars, VEE Pro is being used to collect data, provide automated testing and to construct remote command and telemetry interfaces. In more everyday environments, it can be found at the heart of manufacturing, process and quality control, and industrial data analysis...

Complete Wireless Design
Complete Wireless Design
Design an entire radio system from the ground up instead of relying on a simple plug-in selection of circuits to be modified. Avoid an arduous trek through theory and mathematical derivations. Cotter Sayre’s Complete Wireless Design is the handbook that fits your needs. It covers wireless hardware design more thoroughly than any...
Hands-On Data Structures and Algorithms with JavaScript: Write efficient code that is highly performant, scalable, and easily testable using JavaScript
Hands-On Data Structures and Algorithms with JavaScript: Write efficient code that is highly performant, scalable, and easily testable using JavaScript

Increase your productivity by implementing complex data structures and algorithms using JavaScript

Key Features

  • A step by step guide, which will provide you with a thorough discussion on the analysis and design of fundamental JavaScript data structures
  • Get a better...
Inside the Security Mind: Making the Tough Decisions
Inside the Security Mind: Making the Tough Decisions
Organizations today commit ever-increasing resources to information security, but are scarcely more secure than they were four or five years ago! By treating information security like an ordinary technological practice—that is, by throwing money, a handful of the latest technologies, and a lineup of gurus at the problem—they...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy