Home | Amazing | Today | Tags | Publishers | Years | Search 
Where Stuff Comes From: How Toasters, Toilets, Cars, Computers and Many Other Things Come to Be As They Are
Where Stuff Comes From: How Toasters, Toilets, Cars, Computers and Many Other Things Come to Be As They Are
Where Stuff Comes From is about paper clips, post-its, bathtubs, cars and all the other stuff in our lives. It is about how these items were imagined into existence and made a part of the American material culture. From the designer to the manufacturer to the business owner to the consumer, Molotch guides us through the worlds of technology,...
The Maverick and His Machine: Thomas Watson, Sr. and the Making of IBM
The Maverick and His Machine: Thomas Watson, Sr. and the Making of IBM

Praise for THE MAVERICK AND HIS MACHINE

"Like all great biographers, Kevin Maney gives us an engaging story and so much more. His fascinating and definitive book about IBM’s founder is replete with amazing revelations and character lessons that resonate today. Among the gems: how a demanding curmudgeon managed to shape...

Computer Evidence: Collection & Preservation (Networking Series)
Computer Evidence: Collection & Preservation (Networking Series)
Learn to Collect Digital Artifacts and Ensure Evidence Acceptance!

Computer Evidence: Collection and Preservation teaches law enforcement and computer forensics investigators how to identify, collect, and maintain digital artifacts to preserve their reliability for admission as evidence. The book focuses on collection and preservation because...

Financing Secrets of a Millionaire Real Estate Investor
Financing Secrets of a Millionaire Real Estate Investor
In 1991, I made my first attempt at financing an investment property through creative means. With a lot of guts and a little knowledge, I made an offer that was accepted by the seller. I tendered $1,000 as earnest money on the sales contract, then proceeded to try to make the deal work. I failed, lost my $1,000, but I learned an important...
C+ + for Programmers (Deitel Developer Series)
C+ + for Programmers (Deitel Developer Series)
The professional programmer’s DEITEL® guide to C++ and object-oriented application development

Written for programmers with a background in high-level language programming, this book applies the Deitel signature live-code approach to teaching programming and explores the C++ language and C++ Standard
...
Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion
Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion
Every day, billions of photographs, news stories, songs, X-rays, TV shows, phone calls, and emails are being scattered around the world as sequences of zeroes and ones: bits. We can’t escape this explosion of digital information and few of us want to–the benefits are too seductive. The technology has enabled unprecedented innovation,...
Advanced Software Testing - Vol. 1: Guide to the ISTQB Advanced Certification as an Advanced Test Analyst (Rockynook Computing)
Advanced Software Testing - Vol. 1: Guide to the ISTQB Advanced Certification as an Advanced Test Analyst (Rockynook Computing)
This book is written for the test analyst who wants to achieve advanced skills in test analysis, design, and execution. With a hands-on, exercise-rich approach, this book teaches you how to define and carry out the tasks required to put a test strategy into action. Learn how to analyze the system, taking into account the user ™s quality...
Perimeter Security
Perimeter Security
Perimeter Security has taken on a new level of importance since 9/11. Whether insuring the safety of government buildings, hospitals, residences, or bio-research labs, the safety of workers and materials can only be ensured by outfitting all points of entry with the appropriate alarm and surveillance equipment. This comprehensive hands-on resource...
Engineering and Social Justice (Synthesis Lectures on Engineers, Technology and Society)
Engineering and Social Justice (Synthesis Lectures on Engineers, Technology and Society)
In recent years, some leaders in the engineering community in the United States and other countries have been seeking to cast engineering as a profession in service to humanity. This characterization is often propelled by “the problem” of an overall dearth of students entering engineering and a specific concern about underrepresentation...
The VMWare Workstation 5 Handbook (Networking & Security)
The VMWare Workstation 5 Handbook (Networking & Security)
Bring the Power of Virtualization Software to Your Next Project!

VMware is the leading virtual machine software available today and it is the foundation for next generation computing as it allows users to run multiple operating systems simultaneously on the same PC. The VMware Workstation 5.0 Handbook teaches users the nuts and bolts of this...

Open Source E-mail Security (Kaleidoscope)
Open Source E-mail Security (Kaleidoscope)
In this book you'll learn the technology underlying secure e-mail systems, from the protocols involved to the open source software packages used to implement e-mail security. This book explains the secure MIME (S/MIME) protocol and how it is used to protect data transmitted across the Internet. It also explains the concepts crucial to stopping...
Security Monitoring
Security Monitoring
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic...
Result Page: 104 103 102 101 100 99 98 97 96 95 94 93 92 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy