Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Crysis: Prima Official Game Guide (Prima Official Game Guides)
Crysis: Prima Official Game Guide (Prima Official Game Guides)

•Detailed strategies on when and where to utilize your Nanosuit abilities, weapon augmentations, vehicles, and more.

•In-depth information on every single weapon, including rates of fire and damage criteria for both single- and multiplayer.

•Incredibly deep tactics covering every single-player
...

Violence at Sea: Piracy in the Age of Global Terrorism
Violence at Sea: Piracy in the Age of Global Terrorism
Violence at Sea is an overview of maritime piracy, examining threats that piracy poses to global security and commerce, as well as measures and policies to mitigate the threat. The essays analyze piracy activities in key shipping lanes (including the African coast, the Arabian Sea, the Bay of Bengal, and the Straits of Malacca-South China...
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to...

Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization

Master the tactics and tools of the advanced persistent threat hacker

In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations...

The FX Bootcamp Guide to Strategic and Tactical Forex Trading
The FX Bootcamp Guide to Strategic and Tactical Forex Trading

A straightforward guide to trading today's dynamic Forex market

Written by Wayne McDonell, the Chief Currency Coach at FX Bootcamp, this book shows readers how to successfully trade the Forex market on their own. FX Bootcamp's Guide to Strategic and Tactical Forex Trading skillfully explains how to combine...

Technology Blueprints: Technology Foundations for High Performance Companies
Technology Blueprints: Technology Foundations for High Performance Companies
In the present era of the post "new economy," scores of successful companies are now tending more than ever to steer away from the old model of extreme reward by extreme speculation. While innovation thrives today, it is focused on the fundamentals of value and high performance. Technology blueprints are concrete, proven tactical and...
Guide to Tactical Perimeter Defense
Guide to Tactical Perimeter Defense

This course is the official courseware for the Security Certified Program SC0-451 certification exam. The Tactical Perimeter Defense course is designed to provide network administrators and certification candidates with hands-on tasks on the most fundamental perimeter security technologies. The network perimeter is often the first...

Domain-Driven Design Distilled
Domain-Driven Design Distilled

Domain-Driven Design (DDD) software modeling delivers powerful results in practice, not just in theory, which is why developers worldwide are rapidly moving to adopt it. Now, for the first time, there’s an accessible guide to the basics of DDD: What it is, what problems it solves, how it works, and how to quickly...

Unity 2018 Artificial Intelligence Cookbook: Over 90 recipes to build and customize AI entities for your games with Unity, 2nd Edition
Unity 2018 Artificial Intelligence Cookbook: Over 90 recipes to build and customize AI entities for your games with Unity, 2nd Edition

Explore various recipes to build games using popular artificial intelligence techniques and algorithms such as Navmesh navigation A*, DFS, and UCB1

Key Features

  • Explore different algorithms for creating decision-making agents that go beyond simple behaviors and movement
  • ...
OPLL: Ossification of the Posterior Longitudinal Ligament
OPLL: Ossification of the Posterior Longitudinal Ligament
Ossifi cation of the posterior longitudinal ligament (OPLL) is no longer only a Japanese disease. In 2004, 18 papers on OPLL and related conditions were published, and 7 of those were from countries other than Japan. Major textbooks on spine surgery, such as The Spine, The Cervical Spine, and Spine Surgery, have devoted chapters to...
Oracle CRM On Demand 2012 Administration Essentials
Oracle CRM On Demand 2012 Administration Essentials

The CRMOD software is built to world-class industry reference models of customer relationship management, and the service provides all the software and features you would need for a world-class customer relationship management practice. This knowledge is essential to keep the costs of investment low and return on the investment high.

...

Ethics of Big Data: Balancing Risk and Innovation
Ethics of Big Data: Balancing Risk and Innovation

What are your organization’s policies for generating and using huge datasets full of personal information? This book examines ethical questions raised by the big data phenomenon, and explains why enterprises need to reconsider business decisions concerning privacy and identity. Authors Kord Davis and Doug Patterson provide...

unlimited object storage image
Result Page: 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy