Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Raavan: Enemy of Aryavarta (Ram Chandra)
Raavan: Enemy of Aryavarta (Ram Chandra)

WITHOUT THE DARKNESS, LIGHT HAS NO PURPOSE.

WITHOUT THE VILLAIN, WHAT WOULD THE GODS DO?

INDIA, 3400 BCE.

A land in tumult, poverty and chaos. Most people suffer quietly. A few rebel. Some fight for a better world. Some for themselves. Some don’t give a damn. Raavan. Fathered by one of the...

Sams Teach Yourself Microsoft Office Access 2003 in 24 Hours
Sams Teach Yourself Microsoft Office Access 2003 in 24 Hours
In just 24 lessons of one hour or less, you will be able to work with and design your own Access databases. Using a straightforward, step-by-step approach, each lesson builds on the previous ones, enabling you to learn the essentials of Access 2003 and all its components from the ground up.

Welcome to Sams Teach Yourself Microsoft Office
...
Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
Adobe Acrobat 6 PDF for Dummies
Adobe Acrobat 6 PDF for Dummies
Covers accessing and distilling PDF files; converting Microsoft Office documents; capturing paper documents and Web pages; printing, annotating, editing and securing PDF files; extracting text and graphics; cataloging and distributing PDF files; creating interactive forms; and building multimedia presentations.
  • Readers can convert...
Behold a Pale Horse
Behold a Pale Horse
Sometime ago I had the opportunity to meet William Cooper and his wife Annie. It was part of my job to verify whether this man did indeed speak the truth or was just another person seeking fame and fortune. What I found was a rugged, bulldog, driven individual who was kind, thoughtful and tenderhearted. He was truly concerned about you and your...
Strategies for Managing Is/It Personnel
Strategies for Managing Is/It Personnel

As IT staff shortages are being experienced worldwide, with a huge gap between the number of positions available for IS/IT workers and the number of available qualified workers to fill them. The major factors that have contributed to the IS/IT crisis include lack of understanding of the career orientations of IS personnel; high IS staff...

Technological Turf Wars: A Case Study of the Computer Antivirus Industry
Technological Turf Wars: A Case Study of the Computer Antivirus Industry
Computer security is a technical and social problem. It is just as much about social relationships as it is about computers as tools. Internet security professionals are as concerned with how people use information as they are with how machines manipulate and process that information. This book is a case study of how the knowledge systems...
The People CMM: A Framework for Human Capital Management (2nd Edition)
The People CMM: A Framework for Human Capital Management (2nd Edition)

Organizations are now competing in two markets, one for their products and services and one for the talent required to produce or perform them. Success in the former is determined by success in the latter. The ability to compete is directly related to the ability to attract, develop, motivate, organize, and retain the...

Protecting Your Mobile App IP: The Mini Missing Manual
Protecting Your Mobile App IP: The Mini Missing Manual

Learn four cost-effective ways to protect the applications you develop for mobile devices. The methods described in this Mini Missing Manual won't stop people from misappropriating your secrets, stealing your name, and copying your code. But if any of those things do...

Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)

Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.

The Information Security...

Mac OS X Lion: Visual Quickstart Guide
Mac OS X Lion: Visual Quickstart Guide
Mac OS X Lion—or also simply called OS X Lion—is the latest version of the computer operating system that put the phrase graphic user interface in everyone’s vocabulary. With Mac OS, you can point, click, and drag to work with files, applications, and utilities. Because the same intuitive interface...
Writing for Digital Media
Writing for Digital Media
In the digital age, we are all consumers and producers, readers and publishers alike. The Internet has made it possible for anyone to publish his or her writing online almost instantaneously for all the world to read.

The evolution of digital media has introduced both unprecedented challenges and opportunities for
...
unlimited object storage image
Result Page: 374 373 372 371 370 369 368 367 366 365 364 363 362 361 360 359 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy