“The secret for success in attracting, winning, retaining and growing client business – whether working as an independent or for a firm.” Mike Lander, CEO, Consulting Strategies Ltd
“Richard knows what clients value and provides clear, practical and experienced guidance on how to become...
The Secrets Series® is breaking new ground again. A two-color page layout, a portable size, and a list of the "Top 100 Secrets" in anesthesia help you to better meet the challenges they face today. And, at no extra charge, you'll also receive online access to the complete contents of the text via Elsevier's innovative...
What do flashlights, the British invasion, black cats, and seesaws have to do with computers? In CODE, they show us the ingenious ways we manipulate language and invent new means of communicating with each other. And through CODE, we see how this ingenuity and our very human compulsion to communicate have driven the technological...
Ruby is famous for being easy to learn, but most users only scratch the surface of what it can do. While other books focus on Ruby's trendier features, The Book of Ruby reveals the secret inner workings of one of the world's most popular programming languages, teaching you to write clear, maintainable code.
All the food you eat, whether it's an apple or a steak or a chocolate-coated cricket, has a story. Let's Eat uncovers the secret lives of our groceries, exploring alternative—and sometimes bizarre—farm technology and touring gardens up high on corporate rooftops and down low in military-style bunkers beneath city...
One of the most important but least discussed elements of a computer game is the gameplay that makes a game compelling and entertaining. Game Design: Theory & Practice focuses on this elusive topic and how you can ensure your title has the best gameplay possible. Richard Rouse discusses in detail key game design topics including game balancing,...
Experiment with cryptography — the science of secret writing. Cipher and decipher codes: transposition and polyalphabetical ciphers, famous codes, typewriter and telephone codes, codes that use playing cards, knots, and swizzle sticks...even invisible writing and sending messages through outer space. Hours of intrigue and challenge. 45...
The world’s most celebrated hacker delivers the lowdown on today’s most serious security weakness–human nature
"Finally someone is on to the real cause of data security breaches–stupid humans … Mitnick … reveals clever tricks of the ‘social engineering’ trade and shows how to fend them...
You are holding the proceedings of FSE 2011, the 18th International Workshop
on Fast Software Encryption. This workshop was organized in cooperation with
the International Association for Cryptologic Research. It was held in Lyngby,
Denmark, during February 13–16, 2011.
The FSE 2011 Program Committee (PC) consisted of...
The little-known story of an iconic photographer, whose work captured?and influenced?a critical moment in American history.
Who was Ernest Withers? Most Americans may not know the name, but they do know his photographs. Withers took some of the most legendary images of the 1950s and ’60s: Martin...
With The Ultimate Competitive Advantage, the authors have drawn on their proprietary experiences with and knowledge of top-performing small to large companies and nonprofits to raise CEO and company standards again. They show how all organizations can continually reinvent themselves to build increasing competitive advantages while...
Learn to master the secrets of the Zend Framework with this new book from php|architect's popular Nanobook series! Written by Zend DevZone editor and well-known PHP expert Cal Evans, php|architect's Guide to Programming with Zend Framework helps you understand the Zend Framework through a detailed roadmap into its features and functionality....