Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Bridge For Dummies
Bridge For Dummies

Bridge, as any player will tell you, is simply the best card game ever. It’s challenging—each hand presents a different set of conditions you must figure out and solve. It's very social—you play with a partner and two opponents. And best of all—it's fun.

Bridge For Dummies, 2E gives you a...

Illustrated C# 2005
Illustrated C# 2005
Illustrated C# 2005 doesnt use the traditional dense prose format of most programming texts. Rather, it presents the C# programming language in a unique visual manner. The book uses three techniques to achieve this: concise text; tables that clarify and summarize language features; and frequent figures and diagrams. Each feature is also...
Chemical Weapons Destruction and Explosive Waste: Unexploded Ordinance Remediations
Chemical Weapons Destruction and Explosive Waste: Unexploded Ordinance Remediations
"The book examines each program, offers various solutions and case studies for each disposal problem, and provides additional sources of information for each program for further reading or consultation."- The Hazardous Waste Consultant.

This book discusses the current and potential treatment technologies involved in
...
The New Rules of Engagement: Life-Work Balance and Employee Commitment
The New Rules of Engagement: Life-Work Balance and Employee Commitment
This book offers practical, down-to-earth solutions for developing a new psychological contract between employer and employee, leading to improved productivity, retention of key employees, attracting a better caliber of new employees, and more.

How many of your employees care enough about their work, or your organization, to do anything...

Mastering Windows Network Forensics and Investigation
Mastering Windows Network Forensics and Investigation

Conduct Cutting-Edge Forensic Investigations of Computer Crimes.

Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.

Now you can get the training you need in this...

Fundamentals of Signal Processing for Sound and Vibration Engineers
Fundamentals of Signal Processing for Sound and Vibration Engineers

Fundamentals of Signal Processing for Sound and Vibration Engineers

Author: Kihong Shin and Joseph K. Hammond

 

Fundamentals of Signal Processing for Sound and Vibration Engineers is based on Joe Hammond’s many years of teaching experience at the...

The Legal Protection of Databases: A Comparative Analysis
The Legal Protection of Databases: A Comparative Analysis
This book examines and compares the several types of protection available for the protection of investment in database creation. The protection of investment in making databases is not harmonized internationally. In some countries, database contents are insufficiently protected and, in others, there is too much protection. While database producers...
Contractual Correspondence for Architects and Project Managers
Contractual Correspondence for Architects and Project Managers
'This book appeals to both practitioners and non-practitioners of procurement and contractual procedures and should be essential reading for both students on the undergraduate built environment-related degrees and practitioners involved within the project life-cycle' Building Engineer May 2006

This book provides over 160 model
...
Home Buying For Dummies (Business & Personal Finance)
Home Buying For Dummies (Business & Personal Finance)
Now updated — America's #1 bestselling home-buying book!

Want to buy a house, but concerned about the market? Have no fear — this trusted guide arms you with Eric Tyson and Ray Brown's time-tested advice and updated strategies for buying a home in current market conditions. You'll discover how to find the right property, make smart...

Ethereum Cookbook: Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps
Ethereum Cookbook: Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps

Mine Ether, deploy smart contracts, tokens, and ICOs, and manage security vulnerabilities of Ethereum

Key Features

  • Build end-to-end decentralized Ethereum apps using Truffle, Web3, and Solidity
  • Explore various solution-based recipes to build smart contracts and foolproof...
Maximum Linux Security (2nd Edition)
Maximum Linux Security (2nd Edition)
Presents in-depth configuration tips and techniques to help eliminate security threats to your LINUX-based computer or network, as delivered by an experienced computer hacker who is now a writer, and security consultant. Softcover. CD-ROM included.

Maximum Linux Security helps Linux administrators identify and plug security holes
...
Rigorous Software Development: An Introduction to Program Verification
Rigorous Software Development: An Introduction to Program Verification

This book is about the use of techniques and tools for the design and implementation of computer systems and software that are free from logical or functional flaws (in the sense of functional requirements). The word rigorous in the title of this book is justified by the fact that the arguments for such fault freeness have their roots...

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy