Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Seventh Function of Language: A Novel
The Seventh Function of Language: A Novel

From the prizewinning author of HHhH, “the most insolent novel of the year” (L’Express) is a romp through the French intelligentsia of the twentieth century.

Paris, 1980. The literary critic Roland Barthes dies―struck by a laundry van―after lunch with the presidential...

C Programming - A Beginner's Course
C Programming - A Beginner's Course
Comments posted online for C Programming – A Beginner's Course: "The text does a great job of explaining concepts and the examples are pretty good." "It covers a lot of ideas and concepts that are left out of the other beginner books." "This book does such a good job at explaining the fundamentals of the...
LightWave 3D 8: 1001 Tips & Tricks
LightWave 3D 8: 1001 Tips & Tricks
If you’re in the bookstore reading this book, buy it. It will be one of the best investments
you can make. There are years of experience in this book, and it will become
your favorite secret weapon.
William “Proton” Vaughan

What’s the next best thing to having an experienced LightWave artist at your
...
Experimenting with AVR Microcontrollers
Experimenting with AVR Microcontrollers

AVR is the brain that runs Arduino, but you don't need the whole Arduino board to do fun projects. Experimenting with AVR Microcontrollers, from Practical AVR Microcontrollers, shows you how to create a spiffy set of projects that you can build to learn more about electronics, about AVR, and just to generate new ideas...

20 Minutes to a Top Performer: Three Fast and Effective Conversations to Motivate, Develop, and Engage Your Employees (Business Books)
20 Minutes to a Top Performer: Three Fast and Effective Conversations to Motivate, Develop, and Engage Your Employees (Business Books)

Transform Average Employees into Powerhouse Performers

“I cannot think of a more important message and timely book. 20 Minutes to a Top Performer offers quick, simple techniques for managers to improve their effectiveness in communicating with their teams.”
Steven Fine, vice president for
...

Photoshop CS2 Killer Tips (Killer Tips)
Photoshop CS2 Killer Tips (Killer Tips)

Scott Kelby and Felix Nelson (the creative team behind Photoshop User magazine) take their best-selling Photoshop Killer Tips books to a whole new level with their update for Photoshop CS2.

...
Secret Recipes of the Python Ninja: Over 70 recipes that uncover powerful programming tactics in Python
Secret Recipes of the Python Ninja: Over 70 recipes that uncover powerful programming tactics in Python

Test your Python programming skills by solving real-world problems

Key Features

  • Access built-in documentation tools and improve your code.
  • Discover how to make the best use of decorator and generator functions
  • Enhance speed and improve concurrency by...
Pinnacle Liquid Edition 6 for Windows : Visual QuickPro Guide (Visual Quickstart Guides)
Pinnacle Liquid Edition 6 for Windows : Visual QuickPro Guide (Visual Quickstart Guides)

Recipients of nine Emmy Awards for technical innovation, Pinnacle products have long been a favorite among professional broadcasters. Now, with Liquid Edition shipping on Alienware Systems new line of notebook computers (and capturing the top engineering award at the National Association of Broadcasters convention), the rest of...

The Da Vinci Code
The Da Vinci Code

While in Paris on business, Harvard symbologist Robert Langdon receives an urgent late-night phone call: the elderly curator of the Louvre has been murdered inside the museum. Near the body, police have found a baffling cipher. While working to solve the enigmatic riddle, Langdon is stunned to discover it leads to a trail of clues hidden in...

Modern Cryptography Primer: Theoretical Foundations and Practical Applications
Modern Cryptography Primer: Theoretical Foundations and Practical Applications

Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these...

Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)
Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)

In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management. Data can be managed securely due to the use of algorithms for ensuring the confidentiality of data, information splitting techniques as well as protocols for sharing...

Mastering Digital Photography, Second Edition (Mastering)
Mastering Digital Photography, Second Edition (Mastering)

This isn't a digital camera book. It's a book about digital photography: how to take great pictures and make great images using imaging technology, while taking into account the special needs of digital cameras. Whether you're a snap-shooting tyro, or an experienced photographer moving into the...

unlimited object storage image
Result Page: 32 31 30 29 28 27 26 25 24 23 22 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy