Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Magic Is Dead: My Journey into the World's Most Secretive Society of Magicians
Magic Is Dead: My Journey into the World's Most Secretive Society of Magicians

In the vein of Neil Strauss’ The Game and Joshua Foer’s Moonwalking with Einstein comes the fascinating story of one man’s colorful, mysterious, and personal journey into the world of magic, and his unlikely invitation into an underground secret society of revolutionary magicians from...

TCP/IP Network Administration (3rd Edition; O'Reilly Networking)
TCP/IP Network Administration (3rd Edition; O'Reilly Networking)

The first edition of TCP/IP Network Administration was written in 1992. In the decade since, many things have changed, yet some things remain the same. TCP/IP is still the preeminent communications protocol for linking together diverse computer systems. It remains the basis of interoperable...

La Passione: How Italy Seduced the World
La Passione: How Italy Seduced the World
A jubilant celebration of Italy’s outsize impact on culture, from literature to art, music to movies, that “masterfully examines the multitude of reasons why so many people fall in love with Italy and the Italian lifestyle” (Forbes)

Can you imagine painting without Leonardo, opera
...
Internet of Things Programming with JavaScript
Internet of Things Programming with JavaScript
The Raspberry Pi Zero is a powerful, low-cost, credit-card sized computer, which lends itself perfectly to begin the controller of sophisticated home automation devices. Using the available on-board interfaces, the Raspberry Pi Zero can be expanded to allow the connection of a virtually infinite number of security sensors and...
Economics of Grids, Clouds, Systems, and Services: 15th International Conference, GECON 2018, Pisa, Italy, September 18–20, 2018, Proceedings (Lecture Notes in Computer Science (11113))
Economics of Grids, Clouds, Systems, and Services: 15th International Conference, GECON 2018, Pisa, Italy, September 18–20, 2018, Proceedings (Lecture Notes in Computer Science (11113))
This volume constitutes the proceedings of the 15th International Conference on the Economics of Grids, Clouds, Systems, and Services (GECON 2018). GECON is a long-held conference that annually brings together economics and computer science researchers, with the ultimate aim of building a strong...
MDX Solutions: With Microsoft SQL Server Analysis Services 2005 and Hyperion Essbase
MDX Solutions: With Microsoft SQL Server Analysis Services 2005 and Hyperion Essbase
An updated version of the leading tutorial and reference on the MDX query language

Now in its second edition, this invaluable reference explains why MDX (MulitDimensional eXpressions) is the most widely accepted software used for dimensional application. You'll learn how to build effective multidimensional data...

Reed-Solomon Codes and Their Applications
Reed-Solomon Codes and Their Applications

Electrical Engineering/Communications/Information Theory "The Berlekamp article alone will make this book worth having." --David Forney, Vice President, Motorola Codex Reed-Solomon Codes and Their Applications Edited by Stephen B. Wicker, Georgia Institute of Technology and Vijay K. Bhargava, University of Victoria On the Voyager...

The Most Important Thing: Discovering Truth at the Heart of Life
The Most Important Thing: Discovering Truth at the Heart of Life

From esteemed teacher Adyashanti, a collection of writings on the search for the ultimate reality beneath the narrative of our lives

"Our inner lives are every bit as astonishing, baffling, and mysterious as the infinite vastness of the cosmos." ?Adyashanti

We all define
...

Absolute Beginner's Guide to Personal Firewalls
Absolute Beginner's Guide to Personal Firewalls

The Absolute Beginner's Guide to Personal Firewalls is designed to provide simplified, yet thorough firewall information on the most prevalent personal firewall software applications available for the non expert firewall consumer. In addition, it offers information and links to Web sites that will help you test your security after your personal...

Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition
Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition
Firewalls and Internet Security: Repelling the Wily Hacker gives invaluable advice and practical tools for protecting our computers. You will learn how to plan and execute a security strategy that will thwart the most determined and sophisticated of hackers, while still allowing your company easy access to Internet services. In particular, the...
Jenkins Fundamentals: Accelerate deliverables, manage builds, and automate pipelines with Jenkins
Jenkins Fundamentals: Accelerate deliverables, manage builds, and automate pipelines with Jenkins

Continuous integration with Jenkins speeds up your projects and saves you time and money

Key Features

  • Get a perfect balance of theories and hands-on activities
  • Apply continuous integration and delivery to your workflow
  • Explore concepts such as the plugin...
Applications of Fourier Transforms to Generalized Functions
Applications of Fourier Transforms to Generalized Functions
The generalized function is one of the important branches of mathematics that has enormous application in practical fields. Especially, its applications to the theory of distribution and signal processing are very much noteworthy. The method of generating solutions is the Fourier transform, which has great applications to the...
Result Page: 48 47 46 45 44 43 42 41 40 39 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy