Home | Amazing | Today | Tags | Publishers | Years | Search 
Boost.Asio C++ Network Programming Cookbook
Boost.Asio C++ Network Programming Cookbook

Key Features

  • Build highly efficient distributed applications with ease
  • Enhance your cross-platform network programming skills with one of the most reputable C++ libraries
  • Find solutions to real-world problems related to network programming with ready-to-use recipes using this...
Web as History: Using Web Archives to Understand the Past and the Present
Web as History: Using Web Archives to Understand the Past and the Present
The World Wide Web has now been in use for more than 20 years. From early browsers to today’s principal source of information, entertainment and much else, the Web is an integral part of our daily lives, to the extent that some people believe ‘if it’s not online, it doesn’t exist.’ While this statement is not...
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat...

Interactive Stories and Video Game Art: A Storytelling Framework for Game Design
Interactive Stories and Video Game Art: A Storytelling Framework for Game Design

The success of storytelling in games depends on the entire development team―game designers, artists, writers, programmers and musicians, etc.―working harmoniously together towards a singular artistic vision. Interactive Stories and Video Game Art is first to define a common design language for understanding and orchestrating...

The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in...

A Theory of the Drone
A Theory of the Drone
Drone warfare has raised profound ethical and constitutional questions both in the halls of Congress and among the U.S. public. Not since debates over nuclear warfare has American military strategy been the subject of discussion in living rooms, classrooms, and houses of worship. Yet as this groundbreaking new work shows, the full...
SQL: Easy SQL Programming & Database Management For Beginners, Your Step-By-Step Guide To Learning The SQL Database (SQL Series)
SQL: Easy SQL Programming & Database Management For Beginners, Your Step-By-Step Guide To Learning The SQL Database (SQL Series)

What makes this book unique is how easy it makes it for you to learn. The author brings you a guide that takes you through a natural sequence of lessons, step-by-step, carefully explaining each concept and staying away from unnecessary technical jargon whilst defining the terms you need to learn. This one-step-at-a-time approach allows anyone...

Castles and Fortified Cities of Medieval Europe: An Illustrated History
Castles and Fortified Cities of Medieval Europe: An Illustrated History

During the Middle Ages, castles and other fortified buildings were a common feature of the European landscape. As central powers rose and fell, the insecurity of the time inspired a revival of fortification techniques first introduced in the Roman Empire. Despite limitations in construction techniques and manpower, medieval fortifications...

Practical Programming for Strength Training
Practical Programming for Strength Training

Practical Programming offers a different approach to exercise programming than that typically found in other exercise texts. Based on a combined 60+ years of academic expertise, elite-level coaching experience, and the observation of thousands of novice trainees, the authors present a chronological analysis of the response to exercise as it...

Microsoft Access 2013: Complete (Shelly Cashman Series)
Microsoft Access 2013: Complete (Shelly Cashman Series)

Introduce your students to the latest that Microsoft Office has to offer with the new generation of Shelly Cashman Series books! For the past three decades, the Shelly Cashman Series has effectively introduced computer skills to millions of students. With MICROSOFT ACCESS 2013, we're continuing our history of innovation by enhancing our...

Computer Science Illuminated
Computer Science Illuminated

Each new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.

Fully revised and updated, the Sixth Edition of the best-selling text Computer Science
...

The Seventh Function of Language: A Novel
The Seventh Function of Language: A Novel

From the prizewinning author of HHhH, “the most insolent novel of the year” (L’Express) is a romp through the French intelligentsia of the twentieth century.

Paris, 1980. The literary critic Roland Barthes dies―struck by a laundry van―after lunch with the presidential...

Result Page: 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 118 117 116 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy