Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Magic For Dummies
Magic For Dummies

You don’t need a white tiger, expensive props, or hours of preparation to do magic. With a little practice, some clever misdirection (which lays at the heart of all magic tricks), and showmanship, you can surprise family, friends, and coworkers using a few everyday items!

If you’re looking to saw a beautiful women in...

Securing SQL Server: Protecting Your Database from Attackers
Securing SQL Server: Protecting Your Database from Attackers

As you move through this book you may notice that this book doesn’t gently flow from one topic to another like a lot of technical books.This is intentional asmany of the subjects covered in this book are going to be related, but separate fields of study. As you move through the various chapters in this book you’ll be able to...

RSA Security's Official Guide to Cryptography
RSA Security's Official Guide to Cryptography

Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained...

CompTIA Network+ N10-006 Cert Guide
CompTIA Network+ N10-006 Cert Guide

This approved study guide helps you master topics on the CompTIA Network+ N10-006 exam, including the following:

  •  Computer network fundamentals
  • The OSI model and TCP/IP stack
  • ...
Principles of Computer Graphics: Theory and Practice Using OpenGL and Maya®
Principles of Computer Graphics: Theory and Practice Using OpenGL and Maya®
to think about what it means. What is Computer Graphics? Simply defined, Computer Graphics (or CG) is the images generated or modified on a computer. These images may be visualizations of real data or imaginary depictions of a fantasy world.

The use of Computer Graphics effects in movies such as The Incredibles and games such as Myst
...
Cryptography and Public Key Infrastructure on the Internet
Cryptography and Public Key Infrastructure on the Internet
Cryptography and Public Key Infrastructure on the Internet provides a thorough overview of the subject. It explains how susceptible networks are to hacking and how cryptography can help. This comprehensive and practical guide covers:

* Public Key Infrastructures (PKIs); important when using cryptography in a large organisation,
...
House of Cards and Philosophy: Underwood's Republic (The Blackwell Philosophy and Pop Culture Series)
House of Cards and Philosophy: Underwood's Republic (The Blackwell Philosophy and Pop Culture Series)

Is Democracy overrated?

Does power corrupt? Or do corrupt people seek power?

Do corporate puppet masters pull politicians’ strings?

Why does Frank talk to the camera?

Can politics deliver on the promise of justice?

...
Three Paths to Profitable Investing: Using ETFs in Healthcare, Infrastructure, and the Environment to Grow Your Assets
Three Paths to Profitable Investing: Using ETFs in Healthcare, Infrastructure, and the Environment to Grow Your Assets

Discover Today’s Newest, Best Paths to Sustainable Wealth

  • Master lower-cost, lower-risk ETF investing in tomorrow’s hottest growth areas: healthcare, infrastructure, and green technology
  • Profit from demographic change and other powerful global trends
  • Learn...
Heuristic Search: Theory and Applications
Heuristic Search: Theory and Applications

Search has been vital to artificial intelligence from the very beginning as a core technique in problem solving. The authors present a thorough overview of heuristic search with a balance of discussion between theoretical analysis and efficient implementation and application to real-world problems. Current developments in search such as...

Programming Applications for Microsoft Office Outlook 2007
Programming Applications for Microsoft Office Outlook 2007

Microsoft Office Outlook 2007 offers compelling new product features including Instant Search, task flagging, the To-Do Bar, Calendar overlays, sharing with friends and coworkers, Really Simple Syndication (RSS) feeds, Electronic Business Cards, Microsoft Office SharePoint Server integration, and plenty of other features that make Outlook...

Everyday Cryptography: Fundamental Principles and Applications
Everyday Cryptography: Fundamental Principles and Applications

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the...

CompTIA A+ Certification All-in-One Exam Guide, 8th Edition (Exams 220-801 & 220-802)
CompTIA A+ Certification All-in-One Exam Guide, 8th Edition (Exams 220-801 & 220-802)

The bestselling CompTIA A+ reference and test preparation guide--fully revised for the new 2012 exam topics

Written by the leading authority on CompTIA A+ certification and training, the new edition of this trusted resource offers complete, up-to-date coverage of CompTIA A+ exams 220-801 and 220-802. You’ll find learning...

Result Page: 24 23 22 21 20 19 18 17 16 15 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy