Home | Amazing | Today | Tags | Publishers | Years | Search 
The Mathematics of Games and Gambling (Mathematical Association of America Textbooks)
The Mathematics of Games and Gambling (Mathematical Association of America Textbooks)
'The whole book is written with great urbanity and clarity ... it is hard to see how it could have been better or more readable.' The Mathematical Gazette

You can't lose with this MAA Book Prize winner if you want to see how mathematics can be used to analyze games of chance and skill. Roulette, craps, blackjack, backgammon,
...
Steal This Computer Book 3: What They Won't Tell You About the Internet
Steal This Computer Book 3: What They Won't Tell You About the Internet
This offbeat, non-technical book looks at what hackers do, how they do it, and how you can protect yourself. This edition also covers rootkits, spyware, web bugs, identity theft, hacktivism, wireless hacking (wardriving), biometrics, and firewalls.

WARNING: This book is not to be used for hacking into government computers, shutting...

Running IPv6
Running IPv6
This is a book about running the IPv6 protocol in heterogeneous environments. It will tell
you how to enable the protocol on Windows, MacOS, FreeBSD, Linux, and Cisco routers, and,
up to a point, on Juniper routers. The intent behind the book is to present a clear view of the
aspects to IPv6 that are of interest to those who’ll
...
Microsoft Office Access 2003: The Complete Reference
Microsoft Office Access 2003: The Complete Reference

The Definitive Resource on Access 2003

CD-ROM contains quick reference section on Access 2003--plus sample database files that support the book's material

Scale mountains of data with a single application with the help of this comprehensive resource. Through detailed, step-by-step instructions, you'll learn how to design and...

Algorithmic Information Theory: Mathematics of Digital Information Processing (Signals and Communication Technology)
Algorithmic Information Theory: Mathematics of Digital Information Processing (Signals and Communication Technology)
This book deals with information processing; so it is far from being a book on information theory (which would be built on description and estimation). The reader will be shown the horse, but not the saddle. At any rate, at the very beginning, there was a series of lectures on “Information theory, through the looking-glass of an...
Behold a Pale Horse
Behold a Pale Horse
Sometime ago I had the opportunity to meet William Cooper and his wife Annie. It was part of my job to verify whether this man did indeed speak the truth or was just another person seeking fame and fortune. What I found was a rugged, bulldog, driven individual who was kind, thoughtful and tenderhearted. He was truly concerned about you and your...
The All-Around Horse and Rider
The All-Around Horse and Rider
Cinch today’s top new riding techniques

In the past twenty-five years, a number of major innovations in horse handling have gained acceptance in the global community. Now Howell presents a one-stop resource for amateur adult riders to help them understand the new approaches and implement them to achieve fast results.

Written by...

The Conspirators Hierarchy: The Committee of Three Hundred
The Conspirators Hierarchy: The Committee of Three Hundred
Can you imagine an all powerful group, that knows no national boundaries, above the laws of all countries, one that controls every aspect of politics, religion, commerce and industry; banking, insurance, mining, the drug trade, the petroleum industry, a group answerable to no one but its members. To the vast majority of us, such a group would...
Malware Forensics: Investigating and Analyzing Malicious Code
Malware Forensics: Investigating and Analyzing Malicious Code

Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and...

The Lucent Library of Science and Technology - Energy Alternatives
The Lucent Library of Science and Technology - Energy Alternatives
Energy drives all life and is a key component to how humanity works, lives, and sustains itself. Due to the depletion of existing energy sources and the damage being done to the earth's ecosystems, renewable, non-polluting energy sources such as solar, wind, and geothermal power, are being developed and implemented.

The twentieth-century
...
Now You Know: The Book of Answers
Now You Know: The Book of Answers
Our daily lives are filled with little sayings and habits that we don't think much about. Many of them have their roots in history and were passed down from our ancestors, and though the reasons for them have often been forgotten, they linger still. Have you ever wondered:
- Why is there a best man at weddings and why are brides carried over
...
PC Magazine Fighting Spyware, Viruses, and Malware
PC Magazine Fighting Spyware, Viruses, and Malware
Think there's no malicious software on your computer? PC Magazine thinks you should think again.

Scans by ISPs have revealed as many as twenty-eight spyware programs running on the average home computer—like yours. That's a lot of people prying into what's on your PC, and a DSL or cable connection is a virtual welcome mat. But by...

Result Page: 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy