Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Art of What Works: How Success Really Happens
The Art of What Works: How Success Really Happens

How to Find Effective Solutions for Any Business Problem--By Recognizing and Building On the Successes of Others

"There is nothing new under the sun."

Though coined more than 2,000 years back, this truism has straight-line relevance to today's business world. Because while every business...

Python for Secret Agents - Second Edition
Python for Secret Agents - Second Edition

Gather, analyze, and decode data to reveal hidden facts using Python, the perfect tool for all aspiring secret agents

About This Book

  • Discover the essential features of Python programming: statements, variables, expressions, and many of the built-in data types
  • Use Python's standard...
Supercoach: 10 Secrets to Transform Anyone's Life
Supercoach: 10 Secrets to Transform Anyone's Life
IF SUPERMAN NEEDED A COACH, HE’D HIRE MICHAEL NEILL!

In this fun, easy-to-read book, best-selling author and internationally renowned success coach Michael Neill shares the secrets of transforming your life and the lives of the people you care about most—your family, friends,...
Java Cryptography (Java Series)
Java Cryptography (Java Series)
Cryptography, the science of secret writing, is the biggest, baddest security tool in the application
programmer's arsenal. Cryptography provides three services that are crucial in secure programming.
These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates,
which prove identity
...
The Photoshop Book for Digital Photographers
The Photoshop Book for Digital Photographers
Some people make their living with a camera, and for these people the maturation of digital photo technology means a significant shift in their trade. The Photoshop Book for Digital Photographers is for people who are already adept with a camera, and pretty much up to speed on the peculiarities of digital photography, too. The book teaches...
The Ten Lost Tribes: A World History
The Ten Lost Tribes: A World History

The legendary story of the ten lost tribes of Israel has resonated among both Jews and Christians down through the centuries: the compelling idea that some core group of humanity was "lost" and exiled to a secret place, perhaps someday to return triumphant. In this fascinating book, Zvi Ben-Dor Benite shows for the first time the...

Microcontroller Systengineer
Microcontroller Systengineer

This book is about a state of the art tool, Flowcode[registered], and how you can use Flowcode to develop microcontroller applications. The book starts very simply with a tutorial project and step-by-step instructions. As you go along the projects increase in difficulty and the new concepts are explained. Each project has a clear description...

Outsourcing for Radical Change: A Bold Approach to Enterprise Transformation
Outsourcing for Radical Change: A Bold Approach to Enterprise Transformation

If you’re looking for a serious infusion of life-blood into your company, transformational outsourcing could be the answer. This new, bold approach is not just about handing off non-core functions in order to cut costs. It’s about transforming the entire operating model—to boost a company’s stock price, increase its...

Encyclopedia of Cryptology
Encyclopedia of Cryptology

Secret writing for the transmission of messages has been practiced for nearly 4,000 years. According to David Kahn, the great historian of cryptology, the first example of an intentionally altered message can be traced to a tomb in ancient Egypt dated about 1900 b.c. In the 40 centuries since that...

Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)
Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)

From time immemorial, the security realm and personal identification task had shown progress by employing technological means like secret knowledge as passwords and Personal Identification Numbers, and by using personal possessions as identity cards and Radio Frequency Identification chips. As opposed to these means which are...

The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit

Master the Metasploit Framework and become an expert in penetration testing.

Key Features

  • Gain a thorough understanding of the Metasploit Framework
  • Develop the skills to perform penetration testing in complex and highly secure environments
  • Learn...
Character Development and Storytelling for Games (Game Development Series)
Character Development and Storytelling for Games (Game Development Series)
This is a book of ideas and of choices. Knowing which choices to make is not teachable. It's part of that creative instinct we call talent whose secret voice guides us every time we sit down at the keyboard. All stories are not identical. They are shaped by all those unique facets of the human beings who write them. All any writer can do when he...
unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy