Home | Amazing | Today | Tags | Publishers | Years | Search 
Hack This: 24 Incredible Hackerspace Projects from the DIY Movement
Hack This: 24 Incredible Hackerspace Projects from the DIY Movement

Join today’s new revolution in creativity and community: hackerspaces. Stop letting other people build everything for you: Do it yourself. Explore, grab the tools, get hands-on, get dirty…and create things you never imagined you could. Hack This is your glorious, full-color passport to the...

Flexible Web Design: Creating Liquid and Elastic Layouts with CSS
Flexible Web Design: Creating Liquid and Elastic Layouts with CSS

Take the book you’re holding in your hands right now, and resize it so that it’s easier to read.

Don’t feel bad—I’ve given you an impossible exercise, but I promise the book will be filled with practical instead of ridiculous exercises from here on out. That’s because we’re going to...

Manager's Guide to the Sarbanes-Oxley Act: Improving Internal Controls to Prevent Fraud
Manager's Guide to the Sarbanes-Oxley Act: Improving Internal Controls to Prevent Fraud

A recent CBS poll revealed that, as a result of corporate scandals at Enron, WorldCom, Adelphia Communications, and others, a whopping two-thirds of Americans believe that corporate executives are dishonest. This overall assessment is even worse now than during the last financial crises, the savings and loan debacle of the 1980s....

Wedding Videography Start to Finish
Wedding Videography Start to Finish

Welcome to Wedding Videography: Start to Finish, a resource to help you step confidently into the field of wedding videography. This book is designed to step the novice wedding videographer through the process of starting a wedding-videography business, filming a wedding, editing the wedding footage, and outputting the final product...

Coding for Penetration Testers: Building Better Tools
Coding for Penetration Testers: Building Better Tools

My Dear Reader,

This wretched war, the gravest threat humankind has ever faced, is not going well at all.We have suffered major setbacks, as our ruthless adversary has conquered vast territories, leaving little ground controlled by our ragtag band of rebels. Our few surviving generals blame the lack of skills in our fighting
...

PeopleSoft for the Oracle DBA
PeopleSoft for the Oracle DBA

This book is aimed at helping Oracle DBAs understand and use PeopleSoft technology. For the typical DBA, the introduction to PeopleSoft is likely to include some surprises, not all of them agreeable. Many—if not most—DBAs have to deal with many different databases, usually supporting different applications. Often they will want to...

Net Locality: Why Location Matters in a Networked World
Net Locality: Why Location Matters in a Networked World
A man is walking down Michigan Avenue in Chicago. He shares a sidewalk with crowds of anonymous people. He sees skyscrapers and signage extending to the horizon. There is a lot going on – people talking, walking, playing, fighting, screaming, driving, and smiling. He sees a coffee shop that excites his interest. He pulls...
Special Edition Using XML Schema
Special Edition Using XML Schema

The Extensible Markup Language is one of the most controversial technologies to come into vogue in recent years. Starting with humble roots with the desire to create a simple subset of SGML, XML burst onto the scene to a fantastic fanfare from developers and hype from the press. As more people have started to adopt XML, more...

The Compatibility Gene: How Our Bodies Fight Disease, Attract Others, and Define Our Selves
The Compatibility Gene: How Our Bodies Fight Disease, Attract Others, and Define Our Selves

This is the story of a few human genes and how we discovered what these genes do. We each have around 25,000 genes, but the genes in this story are those that vary the most from person to person. These genes--called compatibility genes--are, in effect, a molecular signature that distinguishes each of us as individuals. Davis tells the...

AI Game Engine Programming (Game Development Series)
AI Game Engine Programming (Game Development Series)

AI Game Engine Programming provides game developers with the tools and wisdom necessary to create modern game AI engines. It takes programmers from theory to actual game development, with usable code frameworks designed to go beyond merely detailing how a technique might be used. In addition, it surveys the capabilities of the different...

Augmented Reality: An Emerging Technologies Guide to AR
Augmented Reality: An Emerging Technologies Guide to AR
Augmented reality (AR) is a technology whose time has come. Conceived in rudimentary form as early as the 1960’s, AR is only now becoming truly practical. Recent advances in mobile processing, coupled with an explosion in digital storage capacity, ubiquity of wireless broadband connections, mass adoption of smart phones, and...
Using Social Media for Global Security
Using Social Media for Global Security

Essential reading for cybersecurity professionals, security analysts, policy experts, decision-makers, activists, and law enforcement!

During the Arab Spring movements, the world witnessed the power of social media to dramatically shape events. Now this timely book shows government decision-makers, security analysts, and...

Result Page: 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy