Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Joomla! 1.5 Extension and Framework Development
Mastering Joomla! 1.5 Extension and Framework Development

Joomla! is one of the world's top open source content management systems, which enables you to build websites and powerful online applications. Out of the box, Joomla! does a great job of managing the content needed to enhance the functionality of your website. But for many people, the true power of Joomla! lies in its application...

Liferay Portal 5.2 Systems Development
Liferay Portal 5.2 Systems Development
Liferay portal is one of the most mature portal frameworks in the market, offering many key business benefits that involve personalization, customization, and workflow. If you are a Java developer who wants to build custom web sites and intranet applications using Liferay portal, this is where your search ends.

This book shows how Java...

Operative Neuromodulation: Volume 2: Neural Networks Surgery (Acta Neurochirurgica Supplement)
Operative Neuromodulation: Volume 2: Neural Networks Surgery (Acta Neurochirurgica Supplement)

This is the second part in a two-volume work on neuromodulation. It describes the techniques and procedures applied by direct contact with the central nervous system or cranial nerves (in order to modulate the function of neural networks) or in deeply located structures inside the nervous system (in order to alter the function on specific...

My War Criminal: Personal Encounters with an Architect of Genocide
My War Criminal: Personal Encounters with an Architect of Genocide

An investigation into the nature of violence, terror, and trauma through conversations with a notorious war criminal by Jessica Stern, one of the world's foremost experts on terrorism.

Between October 2014 and November 2016, global terrorism expert Jessica Stern held a series of conversations in a...

Social Engineering: The Art of Human Hacking
Social Engineering: The Art of Human Hacking

The first book to reveal and dissect the technical aspect of many social engineering maneuvers

From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the...

Sams Teach Yourself Microsoft SQL Server T-SQL in 10 Minutes
Sams Teach Yourself Microsoft SQL Server T-SQL in 10 Minutes
Sams Teach Yourself Microsoft SQL Server T-SQL in 10 Minutes offers straightforward, practical answers when you need fast results. By working through 10-minute lessons, you’ll learn everything you need to know to take advantage of Microsoft SQL Server’s T-SQL language.

 

The Next 100 Years: A Forecast for the 21st Century
The Next 100 Years: A Forecast for the 21st Century

A fascinating, eye-opening and often shocking look at what lies ahead for the U.S. and the world from one of our most incisive futurists.
 
In his thought-provoking new book, George Friedman, founder of STRATFOR—the preeminent private intelligence and forecasting firm—focuses on what he knows best, the future.
...

Seeing Through New Eyes: Changing the Lives of Children with Autism, Asperger Syndrome and other Developmental Disabilities Through Vision Therapy
Seeing Through New Eyes: Changing the Lives of Children with Autism, Asperger Syndrome and other Developmental Disabilities Through Vision Therapy

Seeing Through New Eyes offers an accessible introduction to the treatment of visual dysfunction, a significant but neglected problem associated with autism spectrum disorders (ASDs) and other developmental disabilities.

Dr. Kaplan identifies common ASD symptoms such as hand-flapping, poor eye contact and tantrums as typical...

Multimedia Fingerprinting Forensics for Traitor Tracing (EURASIP Book Series on Signal Processing and Communications)
Multimedia Fingerprinting Forensics for Traitor Tracing (EURASIP Book Series on Signal Processing and Communications)
The popularity of multimedia content has led to the widespread distribution and consumption of digital multimedia data. As a result of the relative ease with which individuals may now alter and repackage digital content, ensuring that media content is employed by authorized users for its intended purpose is becoming an issue of eminent importance...
Generation Xbox: How Videogames Invaded Hollywood
Generation Xbox: How Videogames Invaded Hollywood

Hollywood is under attack from videogames. Movies defined the 20th century but games are now pushing them aside as the medium that captures our time, fascination and money. Generation Xbox digs into the love-hate relationship between games and cinema that has led us to this point. It's a story of disaster, triumph and Angelia Jolie in hot...

Extending jQuery
Extending jQuery

Summary

Extending jQuery teaches you to build custom extensions to the jQuery library. It covers all the extension points within jQuery and provides guidelines and techniques on how to make use of them. You'll not only discover how to write plugins, but how to design them for maximum reuse. You'll...

101 Spy Gadgets for the Evil Genius
101 Spy Gadgets for the Evil Genius
101 SPY DEVICES FOR SERIOUS SNOOPING

This book offers an amazingly awesome and complete collection of professional spy tools that you can build yourself. You can build any project in this thrilling arsenal of spy devices for $30 or less! Not only that, even total beginners to electronics can construct these mind-boggling...

unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy