Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Human Swarm: How Our Societies Arise, Thrive, and Fall
The Human Swarm: How Our Societies Arise, Thrive, and Fall
The epic story, ultimate big history, and "remarkable intellectual achievement" (Quarterly Review of Biology) describing how human society evolved from intimate chimp communities into the sprawling civilizations of a world-dominating species

If a chimpanzee ventures into the territory
...
The Twice-Born: Life and Death on the Ganges
The Twice-Born: Life and Death on the Ganges

In The Twice-Born, Aatish Taseer embarks on a journey of self-discovery in an intoxicating, unsettling personal reckoning with modern India, where ancient customs collide with the contemporary politics of revivalism and revenge

When Aatish Taseer first came to Benares, the spiritual capital of Hinduism, he...

The Best of the Best of Business Card Design (Graphic Design)
The Best of the Best of Business Card Design (Graphic Design)
A business card is more than a piece of paper with your name on it. It's your calling card; a snapshot of your brand identity, a constant reminder in your client's Rolodexes. Perhaps that's why Rockport's Best of Business Card Design Series is so eagerly anticipated year after year. Now, Rockport brings together the very best examples of...
Identity Theft: A Reference Handbook (Contemporary World Issues)
Identity Theft: A Reference Handbook (Contemporary World Issues)

A comprehensive examination of different forms of identity theft and its economic impact, including profiles of perpetrators and victims and coverage of current trends, security implications, prevention efforts, and legislative actions.

• Includes a chronology of key decisions, cases, and government action in the development...

Get Ready for OpenID
Get Ready for OpenID
This is the first book written on the OpenID system and it provides comprehensive information to beginners and mid level programmers of OpenID. The book includes topics like: o Introduction to identity management o Creating OpenID identities o Using OpenID to login to web sites o Understanding the OpenID protocol o Structure of OpenID messages o...
Introduction to Biometrics
Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic commerce, and welfare disbursement require reliable person recognition systems. Traditional person authentication methods based on passwords and identity documents often fail to meet the stringent security and performance demands of these...
Work (The Art of Living Series)
Work (The Art of Living Series)

Work is one of the most universal features of human life; virtually everybody spends some part of their life at work. It is often associated with tedium and boredom; in conflict with the things we would otherwise love to do. Thinking of work primarily as a burden - an activity we would rather be without - is a thought that was shared by the...

Science Of Storytelling
Science Of Storytelling
If you want to write a novel or a script, read this book Sunday TimesThe best book on the craft of storytelling Ive ever read Matt HaigRarely has a book engrossed me more, and forced me to question everything Ive ever read, seen or written. A masterpiece Adam RutherfordWho would we be without storiesStories mould who we are, from our character...
Stealing the Network: How to Own an Identity
Stealing the Network: How to Own an Identity
The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.

In this third installment, the all-star cast of authors tackle one of the
...
Programming Windows Identity Foundation (Dev - Pro)
Programming Windows Identity Foundation (Dev - Pro)

A few years ago, I was sitting at a table playing a game of poker with a few colleagues from Microsoft who had all been involved at various times in the development of Web Services Enhancements for Microsoft .NET (WSE). Don Box, Mark Fussell, Kirill Gavrylyuk, and I played the hands while showman extraordinaire Doug Purdy engaged us with...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

The Facebook Era: Tapping Online Social Networks to Build Better Products, Reach New Audiences, and Sell More Stuff
The Facebook Era: Tapping Online Social Networks to Build Better Products, Reach New Audiences, and Sell More Stuff

“People in all demographics and regions of the world are more connected than ever before to the products, issues, places, and individuals in their lives. This book recognizes that we’ve come to a place where people can represent their real identity--both personal and professional--and use the social filters...

unlimited object storage image
Result Page: 35 34 33 32 31 30 29 28 27 26 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy