Home | Amazing | Today | Tags | Publishers | Years | Search 
Hackers: Heroes of the Computer Revolution
Hackers: Heroes of the Computer Revolution
Steven Levy's classic book explains why the misuse of the word "hackers" to describe computer criminals does a terrible disservice to many important shapers of the digital revolution. Levy follows members of an MIT model railroad club--a group of brilliant budding electrical engineers and computer innovators--from the late 1950s to...
Microsoft Office PerformancePoint Server 2007
Microsoft Office PerformancePoint Server 2007
Writing a book is hard. That’s why I write book Forewords. I do know that having passion is important to writing a good book. Passion carries you the distance, through the nights and weekends required to finish the book. Passion also drives the quality and depth of the book. Your authors have passion to spare. You’ll see this and feel...
Chess For Dummies
Chess For Dummies
It was inevitable, thank goodness, that the Dummies series would give us an introductory chess book. The light touch is perfect to offset the sober aura of mystery that surrounds the game in many people's minds. And the extras that reach beyond the well-written move explanations, strategies, and pattern-recognition make the book a real...
Brands That Rock: What Business Leaders Can Learn from the World of Rock and Roll
Brands That Rock: What Business Leaders Can Learn from the World of Rock and Roll
"Reading Brands That Rock is like attending business school, where classes on customer loyalty, consumer behavior, and branding are taught by Mick Jagger, Elton John, Steven Tyler, and Madonna."

–Tommy Hilfiger, Designer

Cadillac and The Rolling Stones. Victoria’s Secret and Madonna. Wal-Mart and...

Mixed Martial Arts Unleashed: Mastering the Most Effective Moves for Victory
Mixed Martial Arts Unleashed: Mastering the Most Effective Moves for Victory
The purpose of this book is to teach the sport of mixed martial arts (MMA), which involves boxing, kicking, striking, wrestling, and grappling, to fi ghters, both amateur and professional, and fans who want to get more out of the sport. People who want to add mixed martial arts to their training in a more specifi c art such as karate, aikido,...
Winning with Software: An Executive Strategy (SEI Series in Software Engineering)
Winning with Software: An Executive Strategy (SEI Series in Software Engineering)

When I mention software to senior executives, I get lots of reactions. Most are frustrated. They complain about missed commitments, quality problems, and unpleasant surprises. Others have been less closely involved. Software was a problem, but those problems have been handled. No one mentions the business opportunities of...

Matrix Algorithms, Volume II: Eigensystems
Matrix Algorithms, Volume II: Eigensystems
This book, Eigensystems, is the second volume in a projected five-volume series entitled Matrix Algorithms. The first volume treated basic decompositions. The three following this volume will treat iterative methods for linear systems, sparse direct methods, and special topics, including fast algorithms for structured matrices.

My
...
Langford's Starting Photography, Fourth Edition: A guide to better pictures for film and digital camera users
Langford's Starting Photography, Fourth Edition: A guide to better pictures for film and digital camera users
If you are serious about learning photography this is the book needed to get started.

This authoritative classic, written by a leading international photography writer and lecturer has been updated by successful photographer, lecturer and best-selling Photoshop Elements author, Philip Andrews.

Benefit from his skill,
...
Fuzzy and Neutrosophic Analysis of Periyars Views on Untouchability
Fuzzy and Neutrosophic Analysis of Periyars Views on Untouchability
For the first time, the social problem of untouchability, which is peculiar to India, is being studied mathematically.

We have used Fuzzy Cognitive Maps and Neutrosophic Cognitive Maps to analyze the views of the revolutionary Periyar E. V. Ramasamy (17.09.1879 – 24.12.1973) who relentlessly worked for more than five decades to secure the...

2600: The Hacker Quarterly, Spring 2005
2600: The Hacker Quarterly, Spring 2005
2600: The Hacker Quarterly, Spring 2005

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well
...
Understanding Criminology: Current Theoretical Debates (Crime and Justice)
Understanding Criminology: Current Theoretical Debates (Crime and Justice)
"Provides a very clear, easily readable introduction to the wide range of criminological theories.". Anne Rees, University of Portsmouth, UK
  • What does contemporary criminological theory look like? .
  • What impact, if any, does it have on policy?
The new edition of this
...
VSTO 3.0 for Office 2007 Programming
VSTO 3.0 for Office 2007 Programming
Welcome to VSTO 3.0 for Office 2007 Programming. This book covers Visual Studio Tools for Office programming, with a primary emphasis on the several new VSTO programming features available for Microsoft Office 2007. VSTO is a phenomenon that means different things to different people. This book introduces developers
to VSTO as a platform for
...
Result Page: 314 313 312 311 310 309 308 307 306 305 304 303 302 301 300 299 298 297 296 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy