Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing
World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing

"Richard Hunter has seen the future, and its really scary. If you ever plan to do anything wrong, you need to read this book. If you suspect that someone will ever try to do anything wrong to you, you also need to read it. I believe that covers pretty much all of us." —Thomas H. Davenport, Director, Accenture Institute for...

Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
3ds Max Modeling: Bots, Mechs, and Droids (Wordware Game and Graphics Library)
3ds Max Modeling: Bots, Mechs, and Droids (Wordware Game and Graphics Library)

3ds Max Modeling: Bots, Mechs, and Droids offers an unparalleled, project-based learning strategy for anyone who is interested in modeling with 3ds Max. From the very first pages, readers will discover how to use the Max toolset to create sophisticated models, including a spider bot, hunter-killer, battle mech, and android. Learn how to use...

Starting Strength (2nd edition)
Starting Strength (2nd edition)
Many things have happened since I started the writing of Starting Strength: A Simple and Practical Guide for Coaching Beginners in 2004. As a result of its publication I have had the opportunity to meet and learn from many new people. It is my sincerest hope that the additions to this book that are the direct result of their input...
Visual C# Game Programming for Teens
Visual C# Game Programming for Teens

Imagine this scenario: You create a hunter character with random stats and hit points and enter the dungeon to begin exploring for treasure. You stumble upon a zombie pacing near a pile of gear and gold! You attack the zombie and it strikes back! You roll 1D20 and score a critical hit! The 20 point die plus dexterity, against the...

A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
Welcome to A Bug Hunter’s Diary. This book describes the life cycles of seven interesting, real-life software security vulnerabilities I found over the past several years. Each chapter focuses on one bug. I’ll explain how I found the bug, the steps I took to exploit it, and how the vendor...
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
There exists a 0-day vulnerability in a particular line of SCADA Master products that are widely used in petrochemical facilities. Furthermore, since the telemetry between the Master and the RTUs (the units located at valves, gauges, etc.) is particularly fragile under attack, the attackers are able to take a two-tiered approach to the damage they...
Active Directory Cookbook, 3rd Edition
Active Directory Cookbook, 3rd Edition
When you need practical hands-on support for Active Directory, the updated edition of this extremely popular Cookbook provides quick solutions to more than 300 common (and uncommon) problems you might encounter when deploying, administering, and automating Microsoft's network directory service. For the third edition, Active Directory expert Laura...
Tracking the Neolithic House in Europe: Sedentism, Architecture and Practice (One World Archaeology)
Tracking the Neolithic House in Europe: Sedentism, Architecture and Practice (One World Archaeology)

The Neolithic period is noted primarily for the change from hunter-gatherer societies to agriculture, domestication and sedentism. This change has been studied in the past by archaeologists observing the movements of plants, animals and people. But has not been examined by looking at the domestic architecture of the time. Along with tracking...

Badass Survival Secrets: Essential Skills to Survive Any Crisis
Badass Survival Secrets: Essential Skills to Survive Any Crisis
You’re a backpacker or a hunter lost in the woods after sundown; what do you do? Your car flips over on an empty highway; how will you survive until morning? If you were left alone in the middle of the wilderness, would you be able to make it? While current technology, such as cell phones and GPS, is helpful, when you are lost in the...
Born Of The Night (The League)
Born Of The Night (The League)

Kidnapped by merciless marauders who threaten her father's planetary kingdom, princess Kiara is rescued by a masked stranger known as Nemesis, a renegade assassin and warrior-soldier who has sworn to protect the innocent. Original.

Best-selling author Sherrilyn Kenyon (The Dark-Hunter novels) restores three out-of-print titles in...

Consciousness Medicine: Indigenous Wisdom, Entheogens, and Expanded States of Consciousness for Healing and Growth
Consciousness Medicine: Indigenous Wisdom, Entheogens, and Expanded States of Consciousness for Healing and Growth
"Françoise Bourzat has written an authoritative book on guided psychedelic therapy with important lessons for anyone thinking of either guiding or being guided.” —Michael Pollan via Twitter

A comprehensive guide to the safe and ethical application of expanded states of
...
unlimited object storage image
Result Page: 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy