|
|
|
|
Hypnosis: A Comprehensive Guide
I first met Tad James in May 1993, when I attended his Accelerated NLP Practitioner Certification in Irvine, California. I was presenting NLP sales training programmes at the time and decided it would be useful for me to get a qualification in NLP. However, I was a little dubious about the hypnosis part of the training. "What use would... | | Learning Construct 2
Design and create your own engaging, extensible, and addictive game using Construct 2
About This Book
-
Discover the important game objects, behaviours, and events within Construct 2 to get you started with game development
-
Create mesmerizing games quickly and efficiently, and become a top...
| | ARM System-on-Chip Architectureinformation appliances - phones, PDAs, laptops and other devices. The ARM is at the heart of this trend, leading the way in system-on-chip (SoC) development and becoming the processor core of choice for many embedded applications.
System-on-chip technology is changing the way we use computers, but it also sets designers the very... |
|
|
| | Pro Android Apps Performance Optimization (Professional Apress)
Android quickly became almost ubiquitous. With the world transitioning from feature phones to
smartphones, and then discovering that tablets are, after all, devices we can hardly live without,
application developers today have a choice between mostly two platforms: Android and iOS.
Android lowered, some may even say broke, the... | | How to Create the Next Facebook: Seeing Your Startup Through, from Idea to IPO
In just under a decade, Facebook has gone from a Harvard prodigy's dorm-room experiment to an essential part of the social life of hundreds of millions of children, teens, and adults across the globe. It's no surprise, then, that the company has been the subject of countless magazine articles, books, and even movies. But despite the... |
|
Mobile and Wireless Network Security and Privacy
Currently the mobile wireless technology is experiencing rapid
growth. However the major challenge for deployment of this technology
with its special characteristics is securing the existing and future
vulnerabilities. Major security and privacy issues for standard wireless
networks include the authentication of wireless clients and... | | | | Windows Vista Ultimate BibleThe ultimate book on the ultimate Vista for gamers and digital media buffs
If you're the ultimate gamer and multimedia fan, Windows Vista Ultimate and this information-packed book are for you. Want to launch games with a single click? Share files with your Xbox 360? Try out new audio and media tools?... |
|
|
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 |