Home | Amazing | Today | Tags | Publishers | Years | Search 
Ninja Mind Control
Ninja Mind Control
Now you can unlock the ancient secrets of Ninja mind control and discover for yourself the fantastic powers of the legendary Ninja warriors. By combining simple methods of meditation with aggressive maneuvers, you can become the master of any situation--from the author of Ninja Secrets of Invisibility.

NINJA MIND CONTROL is, without
...
ALE, EDI, & IDoc Technologies for SAP, 2nd Edition (Prima Tech's SAP Book Series)
ALE, EDI, & IDoc Technologies for SAP, 2nd Edition (Prima Tech's SAP Book Series)
Application Link Enabling (ALE) is SAP’s proprietary technology that enables data communications between two or more SAP R/3 systems and/or SAP R/3 legacy systems. ALE and EDI (Electronic Data Interchange) technologies are the best fit for this type of communication. With ALE, EDI, & IDoc Technologies for SAP, 2nd Edition, you will...
Practical CakePHP Projects (Practical Projects)
Practical CakePHP Projects (Practical Projects)
If you’ve been using PHP for sometime now and would like to start using a web framework, you’ll want to try CakePHP, which is an open source rapid development web framework built on PHP.

PHP experts Kai Chan and John Omokore guide you through a variety of practical CakePHP applications. You will...

Autonomous Robots and Agents (Studies in Computational Intelligence)
Autonomous Robots and Agents (Studies in Computational Intelligence)
Robots and autonomous agents have permeated every aspect of human life. They are not only omnipresent on the shop floors; they have pervaded our homes and are around us everywhere. Design methodologies and implementation techniques of intelligent machines are making progress in leaps and bounds. Smart interaction, cooperation, and pro-activeness...
Augmented Vision Perception in Infrared: Algorithms and Applied Systems (Advances in Pattern Recognition)
Augmented Vision Perception in Infrared: Algorithms and Applied Systems (Advances in Pattern Recognition)
Spurred by security and safety challenges, research efforts in thermographic sensors have advanced greatly, resulting in better performance in remote surveillance, object recognition, guidance and so on.

 

This comprehensive survey provides a thorough account of the recent deployment of infrared sensors in modern applications of...

49 explosive games for the ZX-81 (A Reward book)
49 explosive games for the ZX-81 (A Reward book)
Books as solid as this one don't just spring out of the Spectrum without a serious investment of time and e ffort.

And there has been plenty of both time and effort spent making sure this collection of games for your Spectrum is as good as we could make it. Drawing on the work of some of the UK's best young computer programmers, I've
...
grep Pocket Reference
grep Pocket Reference
grep Pocket Reference is the first guide devoted to grep, the powerful utility program that helps you locate content in any file on a Unix or Linux system. Several applications use grep, from mail filtering and system log management to malware analysis and application development, and there are many other ways to use the utility. This pocket...
Silverlight 2 Unleashed
Silverlight 2 Unleashed
Full Color Code samples appear as they do in Visual Studio and Expression Blend!

 

Printed entirely in color, with helpful figures and syntax coloring to make code samples appear as they do in Visual Studio and Expression Blend!

 

Data Preparation for Data Mining (The Morgan Kaufmann Series in Data Management Systems)
Data Preparation for Data Mining (The Morgan Kaufmann Series in Data Management Systems)
Data Preparation for Data Mining addresses an issue unfortunately ignored by most authorities on data mining: data preparation. Thanks largely to its perceived difficulty, data preparation has traditionally taken a backseat to the more alluring question of how best to extract meaningful knowledge. But without adequate preparation of your...
Security Monitoring
Security Monitoring
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic...
Automating Linux and Unix System Administration, Second Edition (Expert's Voice in Linux)
Automating Linux and Unix System Administration, Second Edition (Expert's Voice in Linux)
Whether you need a network of ten Linux PCs and a server or a datacenter with a few thousand Unix nodes, you need to know how to automate much of the installation, configuration, and standard system administration.

Build your network once using cfengine, and the network build will work, without user intervention, on any hardware you prefer....

iPhone SDK Application Development: Building Applications for the AppStore
iPhone SDK Application Development: Building Applications for the AppStore
This practical book offers the knowledge and code you need to create cutting-edge mobile applications and games for the iPhone and iPod Touch, using Apple's iPhone SDK. iPhone SDK Application Development introduces you to this development paradigm and the Objective-C language it uses with numerous examples, and also walks you through the many SDK...
Result Page: 547 546 545 544 543 542 541 540 539 538 537 536 535 534 533 532 531 530 529 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy