Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pop Song Piracy: Disobedient Music Distribution since 1929
Pop Song Piracy: Disobedient Music Distribution since 1929


The music industry’s ongoing battle against digital piracy is just the latest skirmish in a long conflict over who has the right to distribute music. Starting with music publishers’ efforts to stamp out bootleg compilations of lyric sheets in 1929, Barry Kernfeld’s Pop Song Piracy details nearly a...
Firing at Will: A Manager's Guide
Firing at Will: A Manager's Guide

Firing at Will shows managers and employers how to do the most difficult part of their jobs: firing employees. Written by a leading employment lawyer in a refreshingly unlawyerly style, this guide takes the reader through the always-risky process of letting an employee go. Many employers and managers are afraid to pull the...

Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Security is a broad topic that is only becoming broader as we become more reliant on computers for everything we do, from work to home to leisure, and our computers become more and more interconnected. Most of our computing experiences now require, or are enriched by, Internet connections, which means our systems are constantly exposed to foreign...
Hack and HHVM: Programming Productivity Without Breaking Things
Hack and HHVM: Programming Productivity Without Breaking Things

How can you take advantage of the HipHop Virtual Machine (HHVM) and the Hack programming language, two new technologies that Facebook developed to run their web servers? With this practical guide, Owen Yamauchi—a member of Facebook’s core Hack and HHVM teams—shows you how to get started with these battle-tested...

History of the Later Roman Empire: From the Death of Theodosius I to the Death of Justinian (Volume 1)
History of the Later Roman Empire: From the Death of Theodosius I to the Death of Justinian (Volume 1)
The first of these two volumes might be entitled the "German Conquest of Western Europe," and the second the "Age of Justinian." The first covers more than one hundred and twenty years, the second somewhat less than fifty. This disparity is a striking illustration of the fact that...
Software Design X-Rays: Fix Technical Debt with Behavioral Code Analysis
Software Design X-Rays: Fix Technical Debt with Behavioral Code Analysis

Are you working on a codebase where cost overruns, death marches, and heroic fights with legacy code monsters are the norm? Battle these adversaries with novel ways to identify and prioritize technical debt, based on behavioral data from how developers work with code. And that's just for starters. Because good code involves...

BlackBerry Planet: The Story of Research in Motion and the Little Device that Took the World by Storm
BlackBerry Planet: The Story of Research in Motion and the Little Device that Took the World by Storm

BlackBerry Planet is a new tribe of people who simply cannot get along without their favorite device, Research in Motion’s innovative electronic organizer, the BlackBerry. This omnipresent device has gone beyond being the world’s foremost mobile business tool and entered the consumer mainstream as the Swiss Army Knife of smart...

The Physics of Superheroes
The Physics of Superheroes
If superheroes stepped off the comic book page or silver screen and into reality, could they actually work their wonders in a world constrained by the laws of physics? How strong would Superman have to be to “leap tall buildings in a single bound”? Could Storm of the X-Men possibly control the weather? And how many cheeseburgers would...
Information, Technology and Control in a Changing World: Understanding Power Structures in the 21st Century (International Political Economy Series)
Information, Technology and Control in a Changing World: Understanding Power Structures in the 21st Century (International Political Economy Series)
This book explores the interconnected ways in which the control of knowledge has become central to the exercise of political, economic, and social power. Building on the work of International Political Economy scholar Susan Strange, this multidisciplinary volume features experts from political science, anthropology, law, criminology,...
The ThoughtWorks Anthology: Essays on Software Technology and Innovation (Pragmatic Programmers)
The ThoughtWorks Anthology: Essays on Software Technology and Innovation (Pragmatic Programmers)
ThoughtWorks is a collection of passionate, driven, intelligent individuals that delivers custom applications and no-nonsense consulting. Ask a ThoughtWorker what they like most about the company, and they will likely say it is the other ThoughtWorkers they get to meet, work with, and learn from. We’re a mixture of geeks, managers, analysts,...
Defend I.T. : Security by Example
Defend I.T. : Security by Example

The battle between IT professionals and those who use the Internet for destructive purposes is raging-and there is no end in sight. Reports of computer crime and incidents from the CERT Coordination Center at Carnegie Mellon University more than double each year and are expected to rise. Meanwhile, viruses and worms continue to...

The New Reality of Wall Street
The New Reality of Wall Street
"A lively, provocative, and comprehensive economic critique and analysis of investment intended for perilous periods and likely to be of enduring value."--Lawrence A. Cunningham, Author and Professor, Boston College

"Tracing the history of investment from the South Sea Bubble to America's bubble economy of the 1990s, Don Coxe has...

Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy