Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Stealing the Network: How to Own the Box
Stealing the Network: How to Own the Box
Stealing the Network: How to Own the Box is a unique book in the fiction department.
It combines stories that are fictional with technology that is real.While
none of these specific events have happened, there is no reason why they could
not.You could argue it provides a roadmap for criminal hackers, but I say it does
something
...
Professional Web APIs with PHP: eBay, Google, Paypal, Amazon, FedEx plus Web Feeds
Professional Web APIs with PHP: eBay, Google, Paypal, Amazon, FedEx plus Web Feeds
As the only book that details how to integrate different APIs and web feeds in PHP so websites can leverage content from eBay, Google, PayPal, Amazon, and FedEx, this hands-on guide takes you step by step through each stage of the API process. Experienced PHP programmer Paul Michael Reinheimer walks you through the production and consumption angles...
Lightwave 3D Character Animation
Lightwave 3D Character Animation
This book is for anyone who has ever had a character in their heart that they’ve wanted to bring to life with as much fluidity, power, and grace as can be seen in the best animated feature films. This is a book for anyone who has wanted to become an animator but hasn’t gone to Sheridan College in Toronto or CalArts in Valencia. This is...
Modeling Derivatives in C++
Modeling Derivatives in C++

This book is the definitive and most comprehensive guide to modeling derivatives in C++ today. Providing readers with not only the theory and math behind the models, as well as the fundamental concepts of financial engineering, but also actual robust object-oriented C++ code, this is a practical introduction to the most important derivative...

Hacking Exposed: Network Security Secrets & Solutions
Hacking Exposed: Network Security Secrets & Solutions
In today's round-the-clock, hyper-connected, all-digital economy, computer security is everyone's business. Hacking Exposed: Network Security Secrets & Solutions, Second Edition brings even more in-depth insight into how hackers infiltrate e-business, and how they can be stopped. Security insiders Stuart McClure, Joel Scambray, and George Kurtz...
.NET Windows Forms Custom Controls
.NET Windows Forms Custom Controls

The intent of this book is to teach .NET developers the skills necessary to create their own leading edge custom controls. The art of creating custom controls has never been truly explored in detail, often the examples provided are trivial and do not begin to explore the requirements need for a commercial quality custom control. This book will...

CCNA Portable Command Guide (2nd Edition) (Self-Study Guide)
CCNA Portable Command Guide (2nd Edition) (Self-Study Guide)
Scott Empson is currently the associate chair of the bachelor of applied information systems technology degree program at the Northern Alberta Institute of Technology in Edmonton, Alberta, Canada, teaching Cisco® routing, switching, and network design courses in certificate, diploma, and applied degree programs at the post-secondary level. He...
Complete Maya Programming, Vol. II: An In-Depth Guide to 3D Fundamentals, Geometry, and Modeling
Complete Maya Programming, Vol. II: An In-Depth Guide to 3D Fundamentals, Geometry, and Modeling
David Gould's acclaimed first book, Complete Maya Programming: An Extensive Guide to MEL and the C++ API, provides artists and programmers with a deep understanding of the way Maya works and how it can be enhanced and customized through programming. In his new book David offers a gentle, intuitive introduction to the core ideas of...
Photoshop for Right-Brainers: The Art of Photo Manipulation
Photoshop for Right-Brainers: The Art of Photo Manipulation
Attention Right-Brainers!

You're an artistic visionary, right? In your head you imagine clever image fixes, fanciful photo manipulations, and artworks of startling genius. But when it comes to bringing these visions to life on your computer -- well, that’s the hard part. If this sounds
...
Raising Your Spirited Child Rev Ed: A Guide for Parents Whose Child Is More Intense, Sensitive, Perceptive, Persistent, and Energetic
Raising Your Spirited Child Rev Ed: A Guide for Parents Whose Child Is More Intense, Sensitive, Perceptive, Persistent, and Energetic
Newly revised, featuring the most up-to-date research, effective strategies, and real-life stories

The spirited child—often called "difficult" or "strong-willed"—possesses traits we value in adults yet find challenging in children. Research shows that spirited kids are wired to be "more"—by...

MCTS Self-Paced Training Kit (Exam 70-503): Microsoft® .NET Framework 3.5 Windows® Communication Foundation (PRO-Certification)
MCTS Self-Paced Training Kit (Exam 70-503): Microsoft® .NET Framework 3.5 Windows® Communication Foundation (PRO-Certification)
Your 2-in-1 Self-Paced Training Kit EXAM PREP GUIDE Ace your preparation for the skills measured by MCTS Exam 70-503 and on the job. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce and apply what you ve learned through real-world case scenarios and practice exercises. This official...
Drools JBoss Rules 5.0 Developer's Guide
Drools JBoss Rules 5.0 Developer's Guide
Business rules can help your business by providing a level of agility and flexibility. As a developer, you will be largely responsible for implementing these business rules effectively, but implementing them systematically can often be difficult due to their complexity. Drools, or JBoss Rules, makes the process of implementing these rules quicker...
unlimited object storage image
Result Page: 462 461 460 459 458 457 456 455 454 453 452 451 450 449 448 447 446 445 444 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy