Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Inventors at Work: The Minds and Motivation Behind Modern Inventions
Inventors at Work: The Minds and Motivation Behind Modern Inventions

Inventors at Work: The Minds and Motivation Behind Modern Inventions is a collection of interviews with inventors of famous products, innovations, and technologies that have made life easier or even changed the way we live. All of these scientists, engineers, wild-eyed geniuses, and amateur technologists have dedicated their...

Writing Security Tools and Exploits
Writing Security Tools and Exploits
Exploits. In most information technology circles these days, the term exploits has
become synonymous with vulnerabilities or in some cases, buffer overflows. It is not
only a scary word that can keep you up at night wondering if you purchased the best
firewalls, configured your new host-based intrusion prevention system correctly,
...
Special Edition Using FileMaker 8
Special Edition Using FileMaker 8
If you're looking for the inside scoop on the latest version of FileMaker, you've come to the right place. Authors Scott Love and Steve Lane are FileMaker experts who were involved in the development of FileMaker 8, and they bring that knowledge to you in ...
Knowledge Management in the Construction Industry: A Socio-Technical Perspective
Knowledge Management in the Construction Industry: A Socio-Technical Perspective

Knowledge Management in the Construction Industry: A Socio-Technical Perspective presents a portfolio of concepts, methods, models, and tools supported by real life case studies from various corners of the globe providing insights into the management of knowledge in the construction industry. Untangling the hype from the reality,...

CWNA Certified Wireless Network Administrator Official Study Guide (Exam PW0-100), Fourth Edition
CWNA Certified Wireless Network Administrator Official Study Guide (Exam PW0-100), Fourth Edition

This book focuses on the objectives for the CWNA exam, but it's also a useful learning tool for anyone wanting to master the many domains of wireless. You’ll learn about wireless technology basics such as radio frequency—based communications, and you’ll learn about specific standards and protocols that ...

Popular Psychology: An Encyclopedia
Popular Psychology: An Encyclopedia

The mysteries of the human mind and human behavior have been a source of fascination and speculation throughout recorded history, and surely, for a long time before that. Attempts to explain human thoughts, emotions, and behavior, especially when they are disordered, go back just as long; and have often involved magic, evil spirits, invisible...

Epidemiology and Biostatistics Secrets: with STUDENT CONSULT Access
Epidemiology and Biostatistics Secrets: with STUDENT CONSULT Access

The Secrets Series® is breaking new ground again. A two-color page layout, a portable size, and a list of the "Top 100 Secrets" in biostatistics and epidemiology help readers to better meet the challenges they face today. And, at no extra charge, purchasers also receive online access to the complete contents of the text via...

Heroes: David Bowie and Berlin (Reverb)
Heroes: David Bowie and Berlin (Reverb)
In 1976, David Bowie left Los Angeles and the success of his celebrated albums Diamond Dogs and Young Americans for Europe. The rocker settled in Berlin, where he would make his “Berlin Trilogy”―the albums Low, Heroes, and Lodger, which are now considered some of the most critically...
Blockchain Quick Reference: A guide to exploring decentralized Blockchain application development
Blockchain Quick Reference: A guide to exploring decentralized Blockchain application development

Understand the Blockchain revolution and get to grips with Ethereum, Hyperledger Fabric, and Corda.

Key Features

  • Resolve common challenges and problems faced in the Blockchain domain
  • Study architecture, concepts, terminologies, and Dapps
  • Make smart choices...
Gaussian Harmonic Analysis (Springer Monographs in Mathematics)
Gaussian Harmonic Analysis (Springer Monographs in Mathematics)

Authored by a ranking authority in Gaussian harmonic analysis, this book embodies a state-of-the-art entrée at the intersection of two important fields of research: harmonic analysis and  probability. The book is intended for a very diverse audience, from graduate students all the way to researchers working in a...

Malicious Cryptography: Exposing Cryptovirology
Malicious Cryptography: Exposing Cryptovirology
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first...
Learning RStudio for R Statistical Computing
Learning RStudio for R Statistical Computing

If you need to create and manage complex statistical analysis projects, this book could be a catalyst for great things. In clear, practical chapters it teaches you how to employ Rstudio's powerful features to perform R statistical computing.

Overview

  • A complete practical tutorial for RStudio, designed...
unlimited object storage image
Result Page: 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy