Net Deals Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. List of autistic fictional characters - Wikipedia

    en.wikipedia.org/wiki/List_of_autistic_fictional...

    The book was adapted into a stage play of the same name. 2003 Lou Arrendale and his co-workers Speed of Dark: Elizabeth Moon: 2004 Ben Niets was alles wat hij zei (Nothing Was All He Said) Nic Balthazar: The book was adapted into the drama film Ben X (2007). 2004 Natalie Flanagan Al Capone Does My Shirts: Gennifer Choldenko

  3. Code 5 - Wikipedia

    en.wikipedia.org/?title=Code_5&redirect=no

    Language links are at the top of the page across from the title.

  4. Possessed (TV series) - Wikipedia

    en.wikipedia.org/wiki/Possessed_(TV_series)

    A serial killer responsible for 30 murders over 5 years. He is a spirit, having been executed 20 years ago, but seeks to gain power to restore his body. At Sangdong Police Station. Lee Won-jong as Detective Squad Chief Yoo; The chief of police who acts as a Guardian to Kang Pil-sung. He is a tough but soft officer who tries to help his comrades.

  5. The Clone Codes - Wikipedia

    en.wikipedia.org/wiki/The_Clone_Codes

    The Clone Codes is a 2010 science fiction novel by American writers Patricia and Fredrick McKissack. It is about a girl, Leanna, who lives in 22nd century America where human clones and cyborgs are treated like second-class citizens , and what happens when she discovers that her parents are activists and that she is a clone.

  6. Twelve Sharp - Wikipedia

    en.wikipedia.org/wiki/Twelve_Sharp

    Followed by. Plum Lovin' and Lean Mean Thirteen. Twelve Sharp, published in 2006, is the 12th novel by Janet Evanovich featuring the bounty hunter Stephanie Plum. The hardcover version appeared at the top of the New York Times Bestseller List in the week of July 9, 2006, while the paperback release has also been in the top four spots in 2007.

  7. The Code Book - Wikipedia

    en.wikipedia.org/wiki/The_Code_Book

    ISBN. 978-1-85702-879-9. OCLC. 59459928. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography is a book by Simon Singh, published in 1999 by Fourth Estate and Doubleday . The Code Book describes some illustrative highlights in the history of cryptography, drawn from both of its principal branches, codes and ciphers.

  8. The Proposal (2009 film) - Wikipedia

    en.wikipedia.org/wiki/The_Proposal_(2009_film)

    The Proposal is a 2009 American romantic comedy film directed by Anne Fletcher and written by Peter Chiarelli. It is produced by Kurtzman/Orci Productions, Mandeville Films and Touchstone Pictures for Walt Disney Studios Motion Pictures, and stars Sandra Bullock and Ryan Reynolds with Malin Åkerman, Craig T. Nelson, Mary Steenburgen and Betty White in supporting roles.

  9. Start-Up (South Korean TV series) - Wikipedia

    en.wikipedia.org/wiki/Start-Up_(South_Korean_TV...

    Start-Up (Korean: 스타트업; RR: Seutateueop) is a South Korean television series starring Bae Suzy, Nam Joo-hyuk, Kim Seon-ho and Kang Han-na. The series revolves around a woman who has dreams of becoming an entrepreneur like Steve Jobs, and her love triangle between a man who is secretly her first love and another man who is pretending to be her first love.

  10. Cyborg: The Second Book of the Clone Codes - Wikipedia

    en.wikipedia.org/wiki/Cyborg:_The_Second_Book_of...

    107. ISBN. 9780439929851. OCLC. 731183759. Cyborg: The Second Book of the Clone Codes is a 2011 book by Patricia and Fredrick McKissack. It is the second book in the Clone Codes trilogy and is about Houston Ye, a teen cyborg who, with Leanna (a girl who discovered she is a clone in the first book, The Clone Codes ), attempt to obtain civil ...

  11. Codebook - Wikipedia

    en.wikipedia.org/wiki/Codebook

    In cryptography, a codebook is a document used for implementing a code. A codebook contains a lookup table for coding and decoding; each word or phrase has one or more strings which replace it. To decipher messages written in code, corresponding copies of the codebook must be available at either end. The distribution and physical security of ...