Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Code: Version 2.0
Code: Version 2.0
The "alarming and impassioned"* book on how the Internet is redefining constitutional law, now reissued as the first popular book revised online by its readers (*New York Times)

There's a common belief that cyberspace cannot be regulated-that it is, in its very essence, immune from the government's (or anyone else's)...

Linux+ 2005 In Depth
Linux+ 2005 In Depth
“...In a future that includes competition from open source, we can expect that the eventual destiny of any software technology will be to either die or become part of the open infrastructure itself.” Eric S....
Introducing ZBrush
Introducing ZBrush
Learn to sculpt detailed, lush, organic models with the hottest tool on the 3D market - ZBrush - and this step-by-step guide. Introducing ZBrush is the ideal initiation to this revolutionary software. Starting with the basics, it builds from the ground up, combining straightforward text with practical examples that make it fun to learn...
A Visual Basic 6 Programmer's Toolkit
A Visual Basic 6 Programmer's Toolkit

A Visual Basic 6 Programmer's Toolkit is an invaluable resource for professionals looking to move to the next level of Visual Basic mastery. Co-authors of the popular Visual Basic 6.0 Bible, Hank Marquis and Eric Smith shed light on many universal VB programming problems, including API calls...

Whiteshift: Populism, Immigration, and the Future of White Majorities
Whiteshift: Populism, Immigration, and the Future of White Majorities
Whiteshift: the turbulent journey from a world of racially homogeneous white majorities to one of racially hybrid majorities
 
This is the century of whiteshift. As Western societies are becoming increasingly mixed-race, demographic change is transforming politics. Over half of American babies are
...
Search Analytics for Your Site
Search Analytics for Your Site

Any organization that has a searchable web site or intranet is sitting on top of hugely valuable and usually under-exploited data: logs that capture what users are searching for, how often each query was searched, and how many results each query retrieved. Search queries are gold: they are real data that show us exactly what users are...

Secure Your Network for Free
Secure Your Network for Free
This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget.

Network security is in a constant struggle for budget to get things done. Upper management wants thing to be secure but doesnt want to pay for
...
From Program to Product: Turning Your Code into a Saleable Product
From Program to Product: Turning Your Code into a Saleable Product
Many would–be software entrepreneurs with expertise in many fields attempt to turn a homegrown application—one developed for use in their own business or profession—into a commercial product. Lack of knowledge, experience, or skills often prevents the idea from ever taking shape, let alone achieving its potential. Entering a new...
Network Security Bible
Network Security Bible
If you need a solid foundation in network security, this is it

Here at last is a comprehensive, focused guide that covers network security from applications to zip files. You'll learn network security principles and best practices, how to apply measures appropriate to various systems, how to identify and respond to an intrusion, and how
...
MatchUp
MatchUp

In this incredible follow-up to the New York Times and USA TODAY bestseller FaceOff, twenty-two of the world’s most popular thriller writers come together for an unforgettable anthology.

MatchUp takes the never-before-seen bestseller pairings of FaceOff and adds a delicious new twist:
...

Principles of Transaction Processing, Second Edition (The Morgan Kaufmann Series in Data Management Systems)
Principles of Transaction Processing, Second Edition (The Morgan Kaufmann Series in Data Management Systems)

This book offers a clear, concise guide for anyone involved in developing applications, evaluating products, designing systems, managing databases, or engineering products. It provides an understanding of the internals of transaction processing systems, describing how they work and how best to use them. It includes the architecture of...

Hadoop Operations
Hadoop Operations
Over the past few years, there has been a fundamental shift in data storage, management, and processing. Companies are storing more data from more sources in more formats than ever before. This isn’t just about being a “data packrat” but rather building products, features, and intelligence predicated on knowing more about...
unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy