Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Joomla! 3 Extension Development-Third Edition
Learning Joomla! 3 Extension Development-Third Edition

Joomla 3 is the first of the major open source content management systems that was meant to be mobile friendly by default. Joomla uses object-oriented principles, is database agnostic, and has the best mix of functionality, extensibility, and user friendliness. Add to that the fact that Joomla is completely community driven, and you have a...

Business Playground: Where Creativity and Commerce Collide, The (Voices That Matter)
Business Playground: Where Creativity and Commerce Collide, The (Voices That Matter)
I am by nature an adventurer and am continually energised by whatever challenges I can find to throw myself into (sometimes almost literally), whether that’s shaking up an industry or trying to circumnavigate the world in a hot air balloon. It’s the same enthusiasm and openness to new things that young children...
Fundamentals of Electric Circuits
Fundamentals of Electric Circuits

Alexander and Sadiku's third edition of Fundamentals of Electric Circuits continues in the spirit of its successful previous editions, with the objective of presenting circuit analysis in a manner that is clearer, more interesting, and easier to understand than the other texts in the market. Students are introduced to the sound,...

iMac For Dummies
iMac For Dummies

Do it all with your iMac and this bestselling For Dummies guide!

You're still a little giddy from finally scoring your new iMac, and you can't wait to get started. Even if you're already in love with your iMac, it helps to have a little guidance to really get the most out of this ultimate all-in-one...

Cyber Adversary Characterization: Auditing the Hacker Mind
Cyber Adversary Characterization: Auditing the Hacker Mind
A book about hacking is a book about everything.
First, the meaning of hacker.

The word “hacker” emerged in an engineering context and became popular
at The Massachusetts Institute of Technology (MIT), among other places, as a
way to talk about any ingenious, creative, or unconventional use of a machine...
The Second Self: Computers and the Human Spirit -- Twentieth Anniversary Edition
The Second Self: Computers and the Human Spirit -- Twentieth Anniversary Edition
In The Second Self, Sherry Turkle looks at the computer not as a "tool," but as part of our social and psychological lives; she looks beyond how we use computer games and spreadsheets to explore how the computer affects our awareness of ourselves, of one another, and of our relationship with the world. "Technology," she...
Kantian Reason and Hegelian Spirit: The Idealistic Logic of Modern Theology
Kantian Reason and Hegelian Spirit: The Idealistic Logic of Modern Theology

Winner: 2012 The American Publishers Award for Professional and Scholarly Excellence in Theology and Religious Studies, PROSE Award.

In this thought-provoking new work, the world renowned theologian Gary Dorrien reveals how Kantian and post-Kantian idealism were instrumental in the foundation and development of modern
...

Common Statistical Methods for Clinical Research with SAS Examples, Third Edition
Common Statistical Methods for Clinical Research with SAS Examples, Third Edition

Aristotle, one of mankind’s greatest thinkers, rooted his basis of human understanding in the notion that universal phenomena can be explained through perception and rationalization. As such, Aristotle conjectured that a 10-pound object should fall through the air 10 times faster than a similar 1-pound object. This, and other intuitive...

Cryptology and Network Security: 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011
Cryptology and Network Security: 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011

It was a real pleasure to have taken part in organizing the 10th International Conference on Cryptography and Network Security (CANS 2011). It was held during December 10–12, 2011, at the International Asia Pacific Convention Center in Sanya, on the subtropical island of Hainan (China). CANS 2011 was sponsored by the National...

Playing with Infinity: Mathematical Explorations and Excursions
Playing with Infinity: Mathematical Explorations and Excursions
Popular account ranges from counting to mathematical logic and covers the many mathematical concepts that relate to infinity: graphic representation of functions; pairings and other combinations; prime numbers; logarithms and circular functions; formulas, analytical geometry; infinite lines, complex numbers, expansion in the power series;...
A Mathematical Introduction to Fluid Mechanics (Texts in Applied Mathematics) (v. 4)
A Mathematical Introduction to Fluid Mechanics (Texts in Applied Mathematics) (v. 4)

The goal of this text is to present some of the basic ideas of fluid mechanics in a mathematically attractive manner, to present the physical background and motivation for some constructions that have been used in recent mathematical and numerical work on the Navier-Stokes equations and on hyperbolic systems and to interest some of the...

Software Engineering: Theory and Practice (4th Edition)
Software Engineering: Theory and Practice (4th Edition)
Software engineering has come a long way since 1У6Х. when the term was first used at a NATO conference. And software itself has entered our lives in ways that few had anti cipated, even a decade ago. So a firm grounding in software engineering theory and practice is essential for understanding how to build good software and...
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy