Home | Amazing | Today | Tags | Publishers | Years | Search 
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

Boring, boring, boring. Isn’t this what immediately comes to mind when one sees books on foundational concepts of information security? Monotonous coverage of theory, dry details of history, brief yet inadequate coverage of every topic known to man, even though you know that you’ll never be hired by the NSA as a...

Printing in Plastic: Build Your Own 3D Printer (Technology in Action)
Printing in Plastic: Build Your Own 3D Printer (Technology in Action)

The book you’re holding in your hands is going to show you how to build your very own 3D Printer. It’s not science fiction. It’s a device that will allow you to print out (in plastic) whatever you can imagine. (Okay, that’s a bit of a stretch – there are size limitations when using this machine.) Read the...

Social Media Marketing: An Hour a Day
Social Media Marketing: An Hour a Day

Pick one. Test-drive a few luxury sports cars. A Ferrari, a Lamborghini, a Maserati maybe? Or compare the top First Growth Bordeaux from 2005. Maybe an Haut-Brion, Latour and Mouton-Rothschild? Alternatively, go play in a social media application. Perhaps creating your profile on Facebook or blogging about your passions or sharing...

Guide to ILDJIT (SpringerBriefs in Computer Science)
Guide to ILDJIT (SpringerBriefs in Computer Science)

We are all familiar with the time-honored idea of a Virtual Machine that is neutral with respect to computer architecture and can be used to execute a high-level language, after its translation to the VM byte-code. This approach can be found in several successful mono-language systems, that support popular languages such as Java or...

Second Life the official guide
Second Life the official guide

When Second Life launched in 2003. running on just 16 servers with barely 1 .ОООdedicated users, it was the culmination of a kind of dream for me. One of the things Td always been interested in, ever since I was a young boy, was how we manipulate the world around us. The world had so much stuff in it; there was always...

iPod & iTunes For Dummies (For Dummies)
iPod & iTunes For Dummies (For Dummies)

Launched on October 23, 2001, the iPod has become the icon of the decade. You don’t need much imagination to see why. Imagine no longer needing to take CDs or DVDs with you when you travel — your favorite music and videos fit right in your pocket and you can leave your precious content library at home. With the iPhone and...

Community-Built Databases: Research and Development
Community-Built Databases: Research and Development

Communities have built collections of information in a collaborative manner for centuries. Around 250 years ago, more than 140 people wrote l’Encyclopedie in 28 volumes with 70,000 articles. More recently, Wikipedia has demonstrated how collaborative efforts can be a powerful method of building a massive data storage. It is...

Network Security Auditing (Networking Technology: Security)
Network Security Auditing (Networking Technology: Security)

Mention the word audit to IT professionals and you will probably see their eyes glaze over as they imagine frightening visions of auditors with pointy tails, pitchforks, and checklists run ning around and pointing out all of the things they have done wrong to their manager. The purpose of a security audit is not to place blame or pick...

101 Windows Phone 7 Apps, Volume I: Developing Apps 1-50
101 Windows Phone 7 Apps, Volume I: Developing Apps 1-50

INCLUDES COMPLETE CODE AND ASSETS FOR EACH APP IN THIS VOLUME!

 

Got a great idea for an app? There’s a chapter for that!

 

Calling all developers: Windows Phone 7 is starting to gain...

Captured by the Light: The Essential Guide to Creating Extraordinary Wedding Photography
Captured by the Light: The Essential Guide to Creating Extraordinary Wedding Photography

IMAGINE THE ADVANTAGE YOU’D HAVE IF ONE OF THE WORLD’S TOP WEDDING SHOOTERS SHARED HIS SECRETS WITH YOU World-renowned wedding photographer, and one of the most widely acclaimed instructors in the industry today, David Ziser brings his no-nonsense, straight-to-the-point teaching style to a book that totally rewrites...

An Introduction to Geographical Information Systems (3rd Edition)
An Introduction to Geographical Information Systems (3rd Edition)

Your encounters with GIS to date may be similar to those of a Martian arriving on Earth and being faced with a motor car. Imagine a Martian coming to Earth and stumbling across a motor car showroom. Very soon he (or she) has heard of a ‘car’ and may even have seen a few glossy brochures. Perhaps you are in the same...

Digital Piracy (Cybersafety)
Digital Piracy (Cybersafety)

The Internet has had and will continue to have a profound effect on society. It is hard to imagine life without such technologies as computers, cell phones, gaming devices, and so on. The Internet, World Wide Web, and their associated technologies have altered our social and personal experience of the world. In no other time in...

Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy