Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Morning Mind: Use Your Brain to Master Your Day and Supercharge Your Life
The Morning Mind: Use Your Brain to Master Your Day and Supercharge Your Life

Unleash positive thinking and productive imagination, and flip negative thoughts and behaviors into a lifetime to improve every aspect of your life—each morning, one day at a time.

Bad habits. Bad feelings. Bad mornings that turn into regrettable days.

Banish them all with simple brain...

HTML5 Game Development Insights
HTML5 Game Development Insights

HTML5 Game Development Insights is a from-the-trenches collection of tips, tricks, hacks, and advice straight from professional HTML5 game developers. The 24 chapters here include unique, cutting edge, and essential techniques for creating and optimizing modern HTML5 games. You will learn things such as using the Gamepad...

React Cookbook: Create dynamic web apps with React using Redux, Webpack, Node.js, and GraphQL
React Cookbook: Create dynamic web apps with React using Redux, Webpack, Node.js, and GraphQL

Over 66 hands-on recipes that cover UI development, animations, component architecture, routing, databases, testing, and debugging with React

Key Features

  • Use essential hacks and simple techniques to solve React application development challenges
  • Create native mobile...
Access Hacks
Access Hacks
As part of the Microsoft Office suite, Access has become the industry's leading desktop database management program for organizing, accessing, and sharing information. But taking advantage of this product to build increasingly complex Access applications requires something more than your typical how-to book. What it calls for is Access Hacks...
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack.

The most common culprit of...

Windows XP Hacks, Second Edition
Windows XP Hacks, Second Edition

Completely revised and updated, this smart collection of insider tips and tricks covers the XP operating system from start to finish, including all the new features that come with Service Pack 2 (SP2). You'll also find timesaving hacks for security, file distribution, digital media, web browsing, and more. An ideal all-in-one...

PC Hacks : 100 Industrial-Strength Tips &Tools
PC Hacks : 100 Industrial-Strength Tips &Tools
Covering both Windows and Linux, PC Hacks combines the bestselling Hacks series style with the world's most popular computing hardware. Hacks for enhancing performance and preventing problems with your PC include overclocking CPU and video cards, tweaking RAM timing, selecting the best performing components,...
Skype Hacks: Tips & Tools for Cheap, Fun, Innovative Phone Service
Skype Hacks: Tips & Tools for Cheap, Fun, Innovative Phone Service

If you've heard about Skype--and who hasn't with all the recent media attention devoted to internet telephone services--chances are you've been mighty tempted to try it out. Skype Hacks tells you what all the Skype hype is about, explains the basics, and shows you more than 100 clever tips and...

CSS Cookbook, 3rd Edition (Animal Guide)
CSS Cookbook, 3rd Edition (Animal Guide)

What people are saying about CSS Cookbook

"Christopher's fantastic cookbook will give you solutions to pretty much all of the CSS problems you'll come up against in your day-to-day web design work, saving you bags of time and frustration. This guy is one of the industry's brightest minds --...

Data-Driven Security: Analysis, Visualization and Dashboards
Data-Driven Security: Analysis, Visualization and Dashboards

Uncover hidden patterns of data and respond with countermeasures

Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to...

Hacking del.icio.us
Hacking del.icio.us
I wrote this book with tinkerers in mind—that is to say, tinkerers of various levels of familiarity with del.icio.us in particular and Web development skill in general.Whether you’re just getting on your way to being a power user at del.icio.us, or whether you’re a hardcore Web development guru who’s running your own...
Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

Result Page: 21 20 19 18 17 16 15 14 13 12 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy