Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
No Middle Name: The Complete Collected Jack Reacher Short Stories
No Middle Name: The Complete Collected Jack Reacher Short Stories

NEW YORK TIMES BESTSELLER • Get ready for the ultimate Jack Reacher experience: a thrilling new novella and eleven previously published stories, together for the first time in one pulse-pounding collection from Lee Child.

No Middle Name begins with “Too Much Time,” a brand-new work of
...

Securing  Intellectual Property: Protecting Trade Secrets and Other Information Assets (Information Security)
Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets (Information Security)

Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.

Nearly all books that address the topic of trade secrets have
...

PC Magazine Windows XP Solutions
PC Magazine Windows XP Solutions
You wanted more Windows XP solutions.
Here they are

PC Magazine's Neil Randall heard you when you asked for more about Windows XP security, fighting spy- ware, and surviving a crash. This second edition includes more than 100 pages of new information about protecting your system, preventing problems, and rescuing data if something...

The Everyday Internet All-in-One Desk Reference for Dummies
The Everyday Internet All-in-One Desk Reference for Dummies
8 books in 1 -- simplify your life with Internet tools
Your one-stop guide to using online resources, keeping in touch, and having fun!
The Internet is a worldwide workplace, a giant communications network, a vast playground, and there's a minibook here covering each aspect of it. Find out about e-mail, researching on the Web,
...
JavaScript Testing with Jasmine: JavaScript Behavior-Driven Development
JavaScript Testing with Jasmine: JavaScript Behavior-Driven Development
All programmers want their code to work the way they intended. Jasmine, a popular testing framework for the JavaScript programming language, allows you to achieve that goal. Through coded specifications, Jasmine helps make your JavaScript work exactly how it’s supposed to. In this book, we’ll explore...
101 Spy Gadgets for the Evil Genius
101 Spy Gadgets for the Evil Genius
101 SPY DEVICES FOR SERIOUS SNOOPING

This book offers an amazingly awesome and complete collection of professional spy tools that you can build yourself. You can build any project in this thrilling arsenal of spy devices for $30 or less! Not only that, even total beginners to electronics can construct these mind-boggling...

Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line
Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line

Bulletproof your organization against data breach, identity theft, and corporate espionage

In this updated and revised edition of Privacy Means Profit, John Sileo demonstrates how to keep data theft from destroying your bottom line, both personally and professionally. In addition to sharing his gripping tale of losing...

Raspberry Pi By Example
Raspberry Pi By Example

Start building amazing projects with the Raspberry Pi right out of the box

About This Book

  • Explore the vast range of opportunities provided by Raspberry Pi and other hardware components such as a webcam, the Pi camera, and sensors
  • Get hands-on experience with coding, networking, and...
Microsoft Office PowerPoint 2007: Top 100 Simplified Tips & Tricks
Microsoft Office PowerPoint 2007: Top 100 Simplified Tips & Tricks
You already know PowerPoint 2007 basics. Now you'd like to go beyond with shortcuts, tricks, and tips that let you work smarter and faster. And because you learn more easily when someone shows you how, this is the book for you. Inside, you'll find clear, illustrated instructions for 100 tasks that reveal cool secrets, teach timesaving tricks, and...
Raspberry Pi for Secret Agents - Second Edition
Raspberry Pi for Secret Agents - Second Edition

Turn your Raspberry Pi into your very own secret agent toolbox with this set of exciting projects

About This Book

  • Turn your Raspberry Pi into a multipurpose secret agent gadget for audio/video surveillance, Wi-Fi exploration, or playing pranks on your friends
  • Detect an intruder on camera...
Microsoft Money 2006 For Dummies (Computer/Tech)
Microsoft Money 2006 For Dummies (Computer/Tech)
Covers Premium, Deluxe, and Standard editions of Money

Use Money to save money, make money, manage money, and get your money's worth

Ever hear that it takes money to make money? Spend a little on this book and discover easy ways to set up accounts, do your banking online, research and track investments, make payments on time, even...

Encyclopedia of Espionage, Intelligence and Security
Encyclopedia of Espionage, Intelligence and Security
In composing The Encyclopedia of Espionage, Intelligence, and Security (EEIS), our goal was to shape a modern encyclopedia offering immediate value to our intended readers by emphasizing matters of espionage, intelligence, and security most frequently in the news.

EEIS is not intended as a classical “spy book,” filled with
...
unlimited object storage image
Result Page: 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy