Home | Amazing | Today | Tags | Publishers | Years | Search 
Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

The Toaster Project: Or a Heroic Attempt to Build a Simple Electric Appliance from Scratch
The Toaster Project: Or a Heroic Attempt to Build a Simple Electric Appliance from Scratch

Where do our things really come from? China is the most common answer, but Thomas Thwaites decided he wanted to know more. In The Toaster Project, Thwaites asks what lies behind the smooth buttons on a mobile phone or the cushioned soles of running sneakers. What is involved in extracting and processing materials? To answer these...

Creating a Brand Identity: A Guide for Designers
Creating a Brand Identity: A Guide for Designers

Creating A Brand Identity is a complex challenge for the graphic designer. It requires practical design skills and creative drive as well as an understanding of marketing and consumer behaviour. This practical handbook is a comprehensive introduction to this creative process.

Exercises and examples highlight the key
...

Beyond Buds: Marijuana Extracts—Hash, Vaping, Dabbing, Edibles and Medicines
Beyond Buds: Marijuana Extracts—Hash, Vaping, Dabbing, Edibles and Medicines
Beyond Buds is a handbook to the future of marijuana. Prohibition’s end has led to a technological revolution that’s generated powerful medicines and products containing almost zero carcinogens and little smoke. Marijuana icon Ed Rosenthal and leading cannabis reporter David Downs guide readers through the best new...
Bottlenecks: Aligning UX Design with User Psychology
Bottlenecks: Aligning UX Design with User Psychology

Learn the psychological constrictions of attention, perception, memory, disposition, motivation, and social influence that determine whether customers will be receptive to your digital innovations.

Bottlenecks: Aligning UX Design with User Psychology fills a need for entrepreneurs, designers, and marketing...

History and Health Policy in the United States: Putting the Past Back In (Critical Issues in Health and Medicine)
History and Health Policy in the United States: Putting the Past Back In (Critical Issues in Health and Medicine)
In our rapidly advancing scientific and technological world, many take great pride and comfort in believing that we are on the threshold of new ways of thinking, living, and understanding ourselves. But despite dramatic discoveries that appear in every way to herald the future, legacies still carry great weight. Even in swiftly developing...
Location-Aware Applications
Location-Aware Applications

Summary

Location-Aware Applications is a comprehensive guide to the technology and business of creating compelling location-based services and applications. The book walks you through the LBS landscape, from mapping technologies to available platforms; from toolkits to business questions like monetization...

Photoshop Elements 13 All-in-One For Dummies
Photoshop Elements 13 All-in-One For Dummies

Make ordinary photos extraordinary with Photoshop Elements 13

Whether you prefer to snap shots on your smartphone or never leave home without your DSLR, chances are you have way more photos than you ever dreamed possible. With the help of Photoshop Elements 13 All-in-One For Dummies, you can edit those photos and turn...

Adobe Photoshop Elements 14 Classroom in a Book
Adobe Photoshop Elements 14 Classroom in a Book

Adobe Photoshop Elements 14 Classroom in a Book is the most thorough and comprehensive way for you to master all the new features in Adobe's top-rated consumer-targeted photo-editing software. Each chapter in this step-by-step, project-based guide contains a project that builds on your growing knowledge of the...

Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

The New Rules of Green Marketing: Strategies, Tools, and Inspiration for Sustainable Branding
The New Rules of Green Marketing: Strategies, Tools, and Inspiration for Sustainable Branding

Green products have been around since the 1970s, but it's only in recent years that they've become ubiquitous. That's because savvy green marketers are no longer targeting "deep green" consumers with a "save the planet" pitch. Instead, they're promoting the added value their products provide: better health,...

Hacking Exposed Mobile: Security Secrets & Solutions
Hacking Exposed Mobile: Security Secrets & Solutions

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Proven security tactics for today's mobile apps,devices, and networks

"A great overview of the new threats created...

Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy