Home | Amazing | Today | Tags | Publishers | Years | Search 
Branding Yourself: How to Use Social Media to Invent or Reinvent Yourself (2nd Edition) (Que Biz-Tech)
Branding Yourself: How to Use Social Media to Invent or Reinvent Yourself (2nd Edition) (Que Biz-Tech)

Want a new job or career? Need to demonstrate more value to customers or employers? Use today’s hottest social media platforms to build the powerful personal brand that gets you what you want! In this completely updated book, Erik Deckers and Kyle Lacy help you use social media to attract new business and job...

Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)
Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)

From time immemorial, the security realm and personal identification task had shown progress by employing technological means like secret knowledge as passwords and Personal Identification Numbers, and by using personal possessions as identity cards and Radio Frequency Identification chips. As opposed to these means which are...

Getting Started with OAuth 2.0
Getting Started with OAuth 2.0
I’ve been working with web-based APIs since 1999, building SOAP-based web services for internal IT applications and helping thousands of developers using Google’s RESTbased APIs for Google Calendar, Picasa Web Albums, YouTube, and more. Each of these APIs has required authorization from users to act on their behalf. Developers...
Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all...

Learning Android Application Programming for the Kindle Fire: A Hands-On Guide to Building Your First Android Application
Learning Android Application Programming for the Kindle Fire: A Hands-On Guide to Building Your First Android Application

The Amazon Kindle Fire is one of the most exciting and popular new Android devices available to consumers and application developers alike. It‘s so popular, in fact, that in the six weeks the Amazon Kindle Fire was available for purchase at the end of 2011, 3.9 million units were sold, accounting for over 14 percent of the tablet...

A Quick Start Guide to Podcasting: Creating Your Own Audio and Visual Materials for iPods, Blackberries, Mobile Phones and Websites
A Quick Start Guide to Podcasting: Creating Your Own Audio and Visual Materials for iPods, Blackberries, Mobile Phones and Websites

We live in exciting times. The internet is arguably the fastest

growing cultural phenomenon in the world, ever. You and I are lucky enough to have been born in time to catch one of those moments in human history when everything changes. Right now we’re in the middle of a
...
Getting Started with RFID: Identify Objects in the Physical World with Arduino
Getting Started with RFID: Identify Objects in the Physical World with Arduino
The process of identifying physical objects is such a fundamental part of our experience that we seldom think about how we do it. We use our senses, of course: we look at, feel, pick up, shake and listen to, smell, and taste objects until we have a reference for them—then we give them a label. The whole...
Packaging the Brand: The Relationship Between Packaging Design and Brand Identity (Required Reading Range)
Packaging the Brand: The Relationship Between Packaging Design and Brand Identity (Required Reading Range)

 

Welcome to Packaging the Brand, a book that will introduce you to the design and creation of packaging as it forms part of the product branding process. This book aims to explore the many different ways by which brands come to be packaged and to consider
...
Hands-On Ethical Hacking and Network Defense
Hands-On Ethical Hacking and Network Defense

It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who...

Euroscepticism: Party Politics, National Identity and European Integration (European Studies 20)
Euroscepticism: Party Politics, National Identity and European Integration (European Studies 20)

The accelerated pace of European integration since the early 1990s has been accompanied by the emergence of increasingly prominent and multiform oppositions to the process. The term Euroscepticism has appeared with growing frequency in a range of political, media, and academic discourses. Yet, the label is applied to a wide range of...

OpenStack Cloud Computing Cookbook
OpenStack Cloud Computing Cookbook
OpenStack is an open source software for building public and private clouds, born from Rackspace and NASA. It is now a global success and is developed and supported by scores of people around the globe and backed by some of the leading players in the cloud space today. This book is specifically designed to quickly help you get up...
Automata, Languages and Programming: 38th International Colloquium, ICALP 2011, Zurich, Switzerland
Automata, Languages and Programming: 38th International Colloquium, ICALP 2011, Zurich, Switzerland

ICALP 2011, the 38th edition of the International Colloquium on Automata, Languages and Programming, was held in Z¨urich, Switzerland, during July 4–8, 2011. ICALP is a series of annual conferences of the European Association for Theoretical Computer Science (EATCS) which first took place in 1972. This year, the ICALP...

Result Page: 37 36 35 34 33 32 31 30 29 28 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy