Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Best of the Best of Business Card Design (Graphic Design)
The Best of the Best of Business Card Design (Graphic Design)
A business card is more than a piece of paper with your name on it. It's your calling card; a snapshot of your brand identity, a constant reminder in your client's Rolodexes. Perhaps that's why Rockport's Best of Business Card Design Series is so eagerly anticipated year after year. Now, Rockport brings together the very best examples of...
Identity Theft: A Reference Handbook (Contemporary World Issues)
Identity Theft: A Reference Handbook (Contemporary World Issues)

A comprehensive examination of different forms of identity theft and its economic impact, including profiles of perpetrators and victims and coverage of current trends, security implications, prevention efforts, and legislative actions.

• Includes a chronology of key decisions, cases, and government action in the development...

Arabs: A 3,000-Year History of Peoples, Tribes and Empires
Arabs: A 3,000-Year History of Peoples, Tribes and Empires
A riveting, comprehensive history of the Arab peoples and tribes that explores the role of language as a cultural touchstone

This kaleidoscopic book covers almost 3,000 years of Arab history and shines a light on the footloose Arab peoples and tribes who conquered lands and disseminated their language and culture
...
Get Ready for OpenID
Get Ready for OpenID
This is the first book written on the OpenID system and it provides comprehensive information to beginners and mid level programmers of OpenID. The book includes topics like: o Introduction to identity management o Creating OpenID identities o Using OpenID to login to web sites o Understanding the OpenID protocol o Structure of OpenID messages o...
Introduction to Biometrics
Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic commerce, and welfare disbursement require reliable person recognition systems. Traditional person authentication methods based on passwords and identity documents often fail to meet the stringent security and performance demands of these...
Work (The Art of Living Series)
Work (The Art of Living Series)

Work is one of the most universal features of human life; virtually everybody spends some part of their life at work. It is often associated with tedium and boredom; in conflict with the things we would otherwise love to do. Thinking of work primarily as a burden - an activity we would rather be without - is a thought that was shared by the...

Science Of Storytelling
Science Of Storytelling
If you want to write a novel or a script, read this book Sunday TimesThe best book on the craft of storytelling Ive ever read Matt HaigRarely has a book engrossed me more, and forced me to question everything Ive ever read, seen or written. A masterpiece Adam RutherfordWho would we be without storiesStories mould who we are, from our character...
Stealing the Network: How to Own an Identity
Stealing the Network: How to Own an Identity
The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.

In this third installment, the all-star cast of authors tackle one of the
...
Programming Windows Identity Foundation (Dev - Pro)
Programming Windows Identity Foundation (Dev - Pro)

A few years ago, I was sitting at a table playing a game of poker with a few colleagues from Microsoft who had all been involved at various times in the development of Web Services Enhancements for Microsoft .NET (WSE). Don Box, Mark Fussell, Kirill Gavrylyuk, and I played the hands while showman extraordinaire Doug Purdy engaged us with...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

The Facebook Era: Tapping Online Social Networks to Build Better Products, Reach New Audiences, and Sell More Stuff
The Facebook Era: Tapping Online Social Networks to Build Better Products, Reach New Audiences, and Sell More Stuff

“People in all demographics and regions of the world are more connected than ever before to the products, issues, places, and individuals in their lives. This book recognizes that we’ve come to a place where people can represent their real identity--both personal and professional--and use the social filters...

Human Computation (Synthesis Lectures on Artificial Intelligence and Machine Learning)
Human Computation (Synthesis Lectures on Artificial Intelligence and Machine Learning)

Human computation is a new and evolving research area that centers around harnessing human intelligence to solve computational problems that are beyond the scope of existing Artificial Intelligence (AI) algorithms. With the growth of the Web, human computation systems can now leverage the abilities of an unprecedented number of people via the...

unlimited object storage image
Result Page: 37 36 35 34 33 32 31 30 29 28 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy