Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Twilio Cookbook Second Edition
Twilio Cookbook Second Edition

Have you ever wanted to integrate phone features into a project you were working on? Maybe you wanted to send SMS messages to your customers about the latest sales? Maybe you want to set up a company directory with voice mail? Or maybe you want to add two-factor authentication to your web sites to verify your users? Since Twilio was launched...

Writing Game Center Apps in iOS: Bringing Your Players Into the Game
Writing Game Center Apps in iOS: Bringing Your Players Into the Game

Now that Apple has introduced the GameKit framework to its iOS SDK, you can integrate Game Center features directly into your iPhone and iPad apps. This concise cookbook shows you how it's done, with 18 targeted recipes for adding leaderboards, user authentication, achievements, multiplayer games, and many other features.

...
Microsoft Office for the Older and Wiser: Get up and running with Office 2010 and Office 2007
Microsoft Office for the Older and Wiser: Get up and running with Office 2010 and Office 2007

I know what you’re thinking: “Office? That sounds a bit dull.” But don’t let the name put you off reading this book. Although Microsoft Office can be used to manage your household accounts and write letters to the bank, it also enables you to enjoy fun projects like creating party invitations, making posters, planning...

Literary Texts and the Greek Historian
Literary Texts and the Greek Historian

This original survey explores the ways in which non-historical texts as well as historical ones can be used to construct Greek historical accounts.

Funding bodies used to be more relaxed, and when I became a graduate student I was admitted to research on ‘Greek literature and/or Roman history’. That capacious definition more...

Structures of Participation in Digital Culture
Structures of Participation in Digital Culture
Digital technologies have been engines of cultural innovation, from the virtualization of group networks and social identities to the digital convergence of textural and audio-visual media. User-centered content production, from Wikipedia to YouTube to Open Source, has become the emblem of this transformation, but the changes run deeper and wider...
Military Intelligence Blunders
Military Intelligence Blunders

This is a book that tries to tell the story of some recent events, all within living memory, from a different angle: intelligence. Most of us have read press accounts and books about the events that unfold on these pages. But very few of us have seen the events from the inside. The inside implies knowledge: and knowledge means power.

...

PC Magazine Windows Vista Security Solutions
PC Magazine Windows Vista Security Solutions
When you want to defend Windows Vista,it's good to know a PC Magazine expert

Unless a time machine just dropped you in the 21st century, you already know that protecting your computer is essential. Now, here's Vista—new enough that no one is sure exactly what security threats might arise to hijack your...

Microsoft Windows Home Server Unleashed (2nd Edition)
Microsoft Windows Home Server Unleashed (2nd Edition)

This is the most comprehensive, practical, and useful guide to Windows Home Server, including Microsoft’s major updates in PowerPacks 1, 2, and 3. Top Windows expert Paul McFedries brings together tips, techniques, and shortcuts available nowhere else and presents them all in plain English for every Windows Home...

The Primary English Encyclopedia
The Primary English Encyclopedia

A comprehensive, user-friendly and interesting reference book that explains key concepts, ideas and current requirements in primary English. Includes:

  • over 600 entries
  • short definitions of key concepts (e.g. parts of speech)
  • succint explanations of current UK requirements
  • ...
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Ever wonder how easy it is to hack into someone’s bank account info while surfing the net at your local Starbucks? Learning how to hack is one of the best preventative measures you can take when protecting yourself from other hackers. Hacking is often misunderstood and that is for good reason. Many people use hacking as...
Augmenting Health and Social Care Students’ Clinical Learning Experiences: Outcomes and Processes (Professional and Practice-based Learning, 25)
Augmenting Health and Social Care Students’ Clinical Learning Experiences: Outcomes and Processes (Professional and Practice-based Learning, 25)

This edited volume offers a range of insights about, practices of and findings associated with enrichening health and social care students’ learning by their engagement in educational processes during and after the completion of their practicum experiences in health and social care settings. That is, using post-practicum...

Modern Methods of Valuation
Modern Methods of Valuation

The new and improved eleventh edition of this essential valuation textbook reflects the changes in the property market since 2009, whilst presenting the tried and tested study of the principles governing the valuation of land, houses and buildings of the previous editions.

The eleventh edition is fully up-to-date...

unlimited object storage image
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy