Home | Amazing | Today | Tags | Publishers | Years | Search 
No Beast So Fierce: The Terrifying True Story of the Champawat Tiger, the Deadliest Animal in History
No Beast So Fierce: The Terrifying True Story of the Champawat Tiger, the Deadliest Animal in History

The astonishing true story of the man-eating tiger that claimed a record 437 human lives

“Thrilling. Fascinating. Exciting.” Wall Street Journal • "Riveting. Haunting.” —Scientific American

Nepal, c....

Light: Science and Magic: An Introduction to Photographic Lighting
Light: Science and Magic: An Introduction to Photographic Lighting
This highly respected text, now in paperback, has been thoroughly updated and revised. It introduces a logical theory of photographic lighting --- one that teaches beginning photographers to predict results before setting up lights. This is not primarily a how-to book with only set examples for photographers to follow. Rather, Light: Science and...
Earthbag Building: The Tools, Tricks and Techniques (Natural Building Series)
Earthbag Building: The Tools, Tricks and Techniques (Natural Building Series)
Over 70 percent of Americans cannot afford to own a code-enforced, contractor-built home. This has led to widespread interest in using natural materials-straw, cob, and earth-for building homes and other buildings that are inexpensive, and that rely largely on labor rather than expensive and often environmentally-damaging outsourced materials....
Active Directory Cookbook, 3rd Edition
Active Directory Cookbook, 3rd Edition
When you need practical hands-on support for Active Directory, the updated edition of this extremely popular Cookbook provides quick solutions to more than 300 common (and uncommon) problems you might encounter when deploying, administering, and automating Microsoft's network directory service. For the third edition, Active Directory expert Laura...
Visual C# Game Programming for Teens
Visual C# Game Programming for Teens

Imagine this scenario: You create a hunter character with random stats and hit points and enter the dungeon to begin exploring for treasure. You stumble upon a zombie pacing near a pile of gear and gold! You attack the zombie and it strikes back! You roll 1D20 and score a critical hit! The 20 point die plus dexterity, against the...

The Renegade Hunter: A Rogue Hunter Novel
The Renegade Hunter: A Rogue Hunter Novel

The Argeneau family has a secret . . . one of their own is a rogue vampire!

Nicholas Argeneau was once a successful hunter who went after rogue vampires who broke the immortal law. Except no one has mentioned his name in the last fifty years, not since he turned into a rogue himself. But once a hunter, always a hunter. When...

Learning Java by Building Android Games: Learn Java and Android from scratch by building five exciting games, 3rd Edition
Learning Java by Building Android Games: Learn Java and Android from scratch by building five exciting games, 3rd Edition

Get ready to learn Java the fun way by developing games for the Android platform with this new and updated third edition

Key Features

  • Learn Java, Android, and object-oriented programming from scratch
  • Find out how to build games including Sub Hunter, Retro Pong, Bullet...
Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
Active Directory Cookbook
Active Directory Cookbook

If you're among those looking for practical hands-on support, help is here with Active Directory Cookbook, Second Edition, a unique problem-solving guide that offers quick answers for Active Directory and updated for Window Server 2003 SP1 and R2 versions.

The book...

Advanced Topics in Global Information Management, Vol. 3
Advanced Topics in Global Information Management, Vol. 3

This is the third book in a series on advanced topics in global information management (GIM). It follows GIM research and progress, and how some scholars challenge the status quo.


Advanced Topics in Global Information Management is the third in a series of books on advance topics in global information management...

Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
There exists a 0-day vulnerability in a particular line of SCADA Master products that are widely used in petrochemical facilities. Furthermore, since the telemetry between the Master and the RTUs (the units located at valves, gauges, etc.) is particularly fragile under attack, the attackers are able to take a two-tiered approach to the damage they...
Beginning XML, Second Edition
Beginning XML, Second Edition
Extensible Markup Language (XML) is a rapidly maturing technology with powerful real-world applications, particularly for the management, display, and transport of data. Together with its many related technologies, it has become the standard for data and document delivery on the Web.

This book teaches you all you need to know about XML –...

Result Page: 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy