Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Evil by Design: Interaction Design To Lead Us Into Temptation
Evil by Design: Interaction Design To Lead Us Into Temptation

Learn how companies make us feel good about doing what they want. Approaching persuasive design from the dark side, this book melds psychology, marketing, and design concepts to show why we're susceptible to certain persuasive techniques. Packed with examples from every nook and cranny of the web, it provides easily digestible and...

Telephone Projects for the Evil Genius
Telephone Projects for the Evil Genius

Since its inception in 1876, the telephone has captured the imagination of people around the world. From its simple origins, the telephone has evolved from the humble device it once was to the modern cell phone or satellite phone. The telephone has fundamentally and instantaneously changed the human race’s ability to communicate over...

Continuous Integration: Improving Software Quality and Reducing Risk (The Addison-Wesley Signature Series)
Continuous Integration: Improving Software Quality and Reducing Risk (The Addison-Wesley Signature Series)
For any software developer who has spent days in “integration hell,” cobbling together myriad software components, Continuous Integration: Improving Software Quality and Reducing Risk illustrates how to transform integration from a necessary evil into an everyday part of the development process. The key, as the...
Snort for Dummies
Snort for Dummies
Find out how to foil an attack on your network

Choose the right way to deploy and configure Snort — no experience required!

Who knows what evil is poking around your network perimeter? Snort will sniff out worms, system crackers, and other bad guys, and this friendly guide helps you...

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

Microsoft Windows Identity Foundation Cookbook
Microsoft Windows Identity Foundation Cookbook
I still remember sitting down with my brand new copy of Writing Secure Code by Michael Howard and David LeBlanc. Having moved beyond writing relatively simple intranet web reports, (before the term "Bl" came to embody what at the time we thought was an incredibly innovative way to display call center metrics for managing...
Arduino + Android Projects for the Evil Genius: Control Arduino with Your Smartphone or Tablet
Arduino + Android Projects for the Evil Genius: Control Arduino with Your Smartphone or Tablet

TEAM ARDUINO UP WITH ANDROID FOR SOME MISCHIEVOUS FUN!

Filled with practical, do-it-yourself gadgets, Arduino + Android Projects for the Evil Genius shows you how to create Arduino devices and control them with Android smartphones and tablets. Easy-to-find equipment and components are used for all the projects in the...

123 Robotics Experiments for the Evil Genius (TAB Robotics)
123 Robotics Experiments for the Evil Genius (TAB Robotics)

The purpose of "Evil Genius" is to create an entertaining book made up of a series of projects that will explain electronics from static electricity (rubbing a balloon) to developing robots. The book will include the tools necessary for the reader to create the projects in the book at very little cost or inconvenience. The book will...

Bionics for the Evil Genius
Bionics for the Evil Genius
The best-selling Evil Genius format provides hobbyists with a fun and inexpensive way to learn bionics via 25 complete projects. Once the focus of popular 70's TV, bionics (integrating mechanical and electronic materials with living matter) are being used more than ever to replace or repair physiological or anatomical functions or disorders....
Microsoft AJAX Library Essentials: Client-side ASP.NET AJAX 1.0 Explained
Microsoft AJAX Library Essentials: Client-side ASP.NET AJAX 1.0 Explained
AJAX is a complex phenomenon that means different things to different people. Computer users appreciate that their favorite websites are now friendlier and feel more responsive. Web developers learn new skills that empower them to create sleek web applications with little effort. Indeed, everything sounds good about AJAX! At its roots, AJAX is a...
Mechatronics for the Evil Genius
Mechatronics for the Evil Genius
DEVELOP THE MECHATRONIC SIDE OF YOUR GENIUS WITH 25 FUNTASTIC PROJECTS!

If you're fascinated by electronics and mechanics, this hands-on tour of the junction where they meet will bring you hours of fun and learning. Noted electronics author Newton Braga's Mechatronics for the Evil Genius guides you step by step...

House Cat : How to Keep Your Indoor Cat Sane and Sound
House Cat : How to Keep Your Indoor Cat Sane and Sound
Loved and worshipped, hated and feared, cats have been companions
to humanity for thousands of years.

A carnivorous mammal in the Felidae family, the cat’s evolutionary
origin is not a clear picture. The most ancient known ancestor
is an animal called Miacis, which had a slender body and short legs.
As for our
...
Result Page: 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy