Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
No Plastic Sleeves: The Complete Portfolio Guide for Photographers and Designers
No Plastic Sleeves: The Complete Portfolio Guide for Photographers and Designers

Your resume and cover letter, as well as a digital portfolio, business card and mailers, will function as the first contact and impression you make. These items will work to get your "foot in the door." Ultimately, however, it will be your portfolio book or online portfolio website that will land you the job. The creation of your...

Raspberry Pi User Guide
Raspberry Pi User Guide

Make the most out of the world’s first truly compact computer

It's the size of a credit card, it can be charged like a smartphone, it runs on open-source Linux, and it holds the promise of bringing programming and playing to millions at low cost. And now you can learn how to use this amazing computer from its...

Malicious Cryptography: Exposing Cryptovirology
Malicious Cryptography: Exposing Cryptovirology
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first...
What We Could Have Done With the Money: 50 Ways to Spend the Trillion Dollars We've Spent on Iraq
What We Could Have Done With the Money: 50 Ways to Spend the Trillion Dollars We've Spent on Iraq
The war in Iraq is not only controversial, it's also astronomically expensive. Now Rob Simpson answers the question many concerned Americans have been asking: Wasn't there some other way the government could have spent one trillion of our tax dollars?

What We Could Have Done with the Money presents 50 thought-provoking spending...

Upgrading and Repairing PCs (20th Edition)
Upgrading and Repairing PCs (20th Edition)

Welcome to Upgrading and Repairing PCs, 20th edition. Since debuting as the first book of its kind on the market in 1988, no other book on PC hardware has matched the depth and quality of the information found in this tome. This edition continues Upgrading and Repairing PCs’ role as not only the best-selling book of...

Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts
Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts

A company’s most important asset next to its people is its information. This information includes intellectual property, company financial information, confidential employee information, customer information, and so much more. Company information may be stored in databases, spreadsheets, flat files, and so on. Loss of...

Avanti! (Italian)
Avanti! (Italian)

Informed by second-language acquisition research and supported by cutting-edge digital tools, the complete Avanti! program creates a dynamic learning environment that fosters communication and motivates students to succeed. With Connect and LearnSmart, Avanti's learning platform gives instructors...

Inside Java 2 Platform Security: Architecture, API Design, and Implementation (2nd Edition)
Inside Java 2 Platform Security: Architecture, API Design, and Implementation (2nd Edition)

Inside Java(TM) 2 Platform Security, the definitive and comprehensive guide to the Java security platform, has been thoroughly updated to reflect key additions and revisions to Java security technologies currently in use by leading technology companies. This second edition, penned by the Java...

Web Security, Privacy and Commerce, 2nd Edition
Web Security, Privacy and Commerce, 2nd Edition
The World Wide Web has changed our world. More than half the people in the United States now use the Web on a regular basis. We use it to read today's news, to check tomorrow's weather, and to search for events that have happened in the distant past. And increasingly, the Web is the focus of the 21st century...
Oracle Performance Tuning and Optimization
Oracle Performance Tuning and Optimization

Database management software and the manipulation of data has evolved to where it touches every aspect of our lives. A day doesn’t go by in which we don’t access a database. Whether we are withdrawing money from an ATM machine, opening a checking account, or purchasing groceries, every aspect of our lives is affected by...

Hack Proofing Your Identity
Hack Proofing Your Identity
The use of a seal, card, or other identification while making a purchase or signing
a contract is a custom almost as old as history. As merchants and their customers
have begun using the Internet in recent years to conduct business online, they
have been challenged to find digital forms of identification that mimic traditional,...
Nikon D600 Digital Field Guide
Nikon D600 Digital Field Guide

Everything you need to know to take amazing photos with your Nikon D600

This full-color, portable guide goes beyond the owner's manual to deliver clear, succinct descriptions of how the Nikon D600's features and functions work. Perfectly sized to fit in your camera bag, this portable guide offers professional advice...

unlimited object storage image
Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy