Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
How to Make a Robot
How to Make a Robot

Learn the basics of modern robotics while building your own intelligent robot from scratch! You'll use inexpensive household materials to make the base for your robot, then add motors, power, wheels, and electronics.

But wait, it gets better: your creation is actually five robots in one! -- build
...

Mission Critical Windows 2000 Server Administration
Mission Critical Windows 2000 Server Administration
To put it in terms understandable to the many former English majors who now manage Windows networks: if Everyman were a system administrator, he'd run Windows 2000 Server. It supports pretty much any business requirement, yet it's user-friendly enough that anyone can learn to be an administrator with a bit of study. Mission Critical! Windows...
20 Minutes to a Top Performer: Three Fast and Effective Conversations to Motivate, Develop, and Engage Your Employees (Business Books)
20 Minutes to a Top Performer: Three Fast and Effective Conversations to Motivate, Develop, and Engage Your Employees (Business Books)

Transform Average Employees into Powerhouse Performers

“I cannot think of a more important message and timely book. 20 Minutes to a Top Performer offers quick, simple techniques for managers to improve their effectiveness in communicating with their teams.”
Steven Fine, vice president for
...

Mac Hacks: Tips & Tools for unlocking the power of OS X
Mac Hacks: Tips & Tools for unlocking the power of OS X

Want to take real control of your Mac? The hacks in this book help you dig below the surface to tweak system preferences, mount drives and devices, and generally do things with your system that Apple doesn’t expect you to do. With a little effort, you can make your Mac and its applications perform exactly the way you want them...

Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise
Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise

Is someone waiting to pick off your BlackBerry?

Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker.

Traditionally, security for mobile devices—which are essentially...

Big Book of Apple Hacks: Tips & Tools for Unlocking the Power of Your Apple Devices
Big Book of Apple Hacks: Tips & Tools for Unlocking the Power of Your Apple Devices
Ostensibly, you buy a computer or gadget to get something done. The something might be as simple as listening to MP3s you’ve ripped from your CD collection or as challenging as creating a full-length feature film. Apple is happy to sell you products to meet your needs. The trouble is your needs aren’t...
A Carrot a Day: A Daily Dose of Recognition for Your Employees
A Carrot a Day: A Daily Dose of Recognition for Your Employees
From the bestselling authors of The 24-Carrot Manager comes a manager's handbook on motivating employees through praise and recognition. Employees fed a steady diet of carrots focus better on company goals. They spot new opportunities faster. They have longer employment life spans (translation: lower turnover). And they can lift companies higher...
Solaris 8 System Administrator Exam Cram (Exam: 310-011, 310-012)
Solaris 8 System Administrator Exam Cram (Exam: 310-011, 310-012)
The perfect study companion for UNIX system professionals preparing for both Solaris 8 System Administrator exams. The book contains accurate and efficient coverage of the many new features of the Solaris 8 system including new support for Ipv6, LDAP, and DHCP, installs using Solaris Web Start, new Universal Disk Format (UDF) file system support,...
Sacred Places Around the World: 108 Destinations (Sacred Places: 108 Destinations series)
Sacred Places Around the World: 108 Destinations (Sacred Places: 108 Destinations series)

Human civilization in the 21st century can be defined by diversity and duality. One-fifth of the world’s population is Chinese, another fifth Muslim. A hundred million of us are homeless children living in extreme poverty. More than two percent of the human population is mentally retarded. There are over 10,000 spoken languages. Yet, a...

Emotional Terrors in the Workplace: Protecting Your Business' Bottom Line
Emotional Terrors in the Workplace: Protecting Your Business' Bottom Line
The failure to adequately address the victims and the emotional dimensions of corporate problems changes adverse events into crises and catastrophes. This book aims to arm employees and managers with the tools necessary to manage emotional distress.

Emotional Terrors in the Workplace: Protecting Your Business' Bottom Line is an...

Network Attacks and Exploitation: A Framework
Network Attacks and Exploitation: A Framework

Incorporate offense and defense for a more effective network security strategy

Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate...

Scientific and Statistical Database Management: 23rd International Conference, SSDBM 2011
Scientific and Statistical Database Management: 23rd International Conference, SSDBM 2011

Welcome to the proceedings of the 23rd International Conference on Scientific and Statistical Database Management held in Portland, Oregon, where it celebrated its 30th birthday. The first incarnation of SSDBM (then called the Workshop on Statistical Database Management) took place in Menlo Park, California, in December 1981. Since...

Result Page: 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy