Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
I was sitting at my desk when my phone rang. I answered the phone and it was a
large pharmaceutical company who was interested in consulting services.They
started off the conversation stating that they had some problems and thought that
my company might be able to help.They had noticed a trend with one of their foreign...
A Brief History of Neoliberalism
A Brief History of Neoliberalism
Neoliberalism--the doctrine that market exchange is an ethic in itself, capable of acting as a guide for all human action--has become dominant in both thought and practice throughout much of the world since 1970 or so. Writing for a wide audience, David Harvey, author of The New Imperialism and The Condition of Postmodernity, here tells the...
Come, Let's Play: Scenario-Based Programming Using LSCs and the Play-Engine
Come, Let's Play: Scenario-Based Programming Using LSCs and the Play-Engine
This book does not tell a story. Instead, it is about stories. Or rather, in technical terms, it is about scenarios. Scenarios of system behavior. It concentrates on reactive systems, be they software or hardware, or combined computer-embedded systems, including distributed and real-time systems.

We propose a
...
The Animator's Survival Kit, Expanded Edition: A Manual of Methods, Principles and Formulas for Classical, Computer, Games, Stop Motion and Internet Animators
The Animator's Survival Kit, Expanded Edition: A Manual of Methods, Principles and Formulas for Classical, Computer, Games, Stop Motion and Internet Animators
The definitive book on animation, from the Academy Award-winning animator behind Who Framed Roger Rabbit?

Animation is one of the hottest areas of filmmaking today--and the master animator who bridges the old generation and the new is Richard Williams. During his fifty years in the business, Williams has been
...
Grant Writing For Dummies
Grant Writing For Dummies

Learn to:

  • Navigate federal grant databases and apply online for grants
  • Find the most current public and private sector grant opportunities
  • Create strong statements of need
  • Submit applications that meet funders’ expectations

Your comprehensive...

Women Leaders at Work: Untold Tales of Women Achieving Their Ambitions
Women Leaders at Work: Untold Tales of Women Achieving Their Ambitions

I was seven years old when my mother showed me her most treasured jewels. Taking my hand in hers, she walked me through the giant oak doors of our town library where she showed me the Orange Books, biographies of historical men and women of achievement. Certainly, there were far fewer books of women than men, but there they were—women...

The Lady Is a Spy: Virginia Hall, World War II Hero of the French Resistance (Scholastic Focus)
The Lady Is a Spy: Virginia Hall, World War II Hero of the French Resistance (Scholastic Focus)
The Lady Is a Spy is the audacious and riveting true story of Virginia Hall, America's greatest spy and unsung hero, brought to vivid life by acclaimed author Don Mitchell.

When Hitler invaded Poland, Virginia Hall was traveling in Europe. Which was dangerous enough, but as fighting erupted,
...
Digital Photography Bible (Desktop Edition)
Digital Photography Bible (Desktop Edition)
If a digital camera can do it, you can do it, too...

Good photography is more art than science. You need to know not only the hardware and software, but also how to compose a photo, edit and improve the images you get, and take pictures that achieve your objectives. From choosing a digital camera to taking shots that tell a...

Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD

"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it...

Mathematics, Computer Science and Logic - A Never Ending Story: The Bruno Buchberger Festschrift
Mathematics, Computer Science and Logic - A Never Ending Story: The Bruno Buchberger Festschrift

This book presents four mathematical essays which explore the foundations of mathematics and related topics ranging from philosophy and logic to modern computer mathematics. While connected to the historical evolution of these concepts, the essays place strong emphasis on developments still to come. 

The book originated in a...

Exploring Java (Java (Addison-Wesley))
Exploring Java (Java (Addison-Wesley))

The second edition of Exploring Java, introduces the basics of Java, the object-oriented programming language for networked applications from Sun Microsystems. This book covers the essentials of hot topics like Beans and RMI and shows you how to get up speed writing Java applets and other applications, including networking...

Understanding COM+
Understanding COM+
Developing enterprise applications has traditionally been a long, painful, and expensive task because applications developers often have to reinvent the wheel by writing, from scratch, the entire infrastructure needed to scale business logic up to the enterprise level. That's where COM+ comes in. It's an advanced Component Object Model (COM)...
Result Page: 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy