Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Best of 2600: A Hacker Odyssey
The Best of 2600: A Hacker Odyssey
The hacker subculture — shrouded in mystery, spiced with a hint of glamour, and thoroughly misunderstood by those who don't belong — was revealed in the original edition of The Best of 2600: A Hacker Odyssey. The book became an instant bestseller. If you're a 2600 subscriber, a member of the hacker community, a geek freak, or simply a...
Never Apply for a Job Again!: Break the Rules, Cut the Line, Beat the Rest
Never Apply for a Job Again!: Break the Rules, Cut the Line, Beat the Rest

"Never Apply For a Job Again! is what everyone needs to understand how the hidden job market works. Get it and use it before the secrets get out on WikiLeaks."
--Penelope Trunk, the original Brazen Careerist, author, blogger, entrepreneur

"This book is an essential read for insightful, witty, and
...

Trusted Computing Platforms: Design and Applications
Trusted Computing Platforms: Design and Applications
Many scenarios in modern computing give rise to a common problem: why
should Alice trust computation that’s occurring at Bob’s machine? (The computer
security field likes to talk about “Alice” and “Bob” and protection against
an “adversary” with certain abilities.) What if Bob, or
...
Chemistry: An Industry-Based Laboratory Manual
Chemistry: An Industry-Based Laboratory Manual
Have you ever sat down and had an open discussion over coffee with an industrial chemist or chemical technician about his or her work? Have you ever “shadowed” a chemist or a chemical technician for a day as he or she went about the daily routine in an industrial or government laboratory? If you have done these things,...
Practical Code Generation in .NET: Covering Visual Studio 2005, 2008, and 2010
Practical Code Generation in .NET: Covering Visual Studio 2005, 2008, and 2010

The story of software engineering has been the story of increasing the level of abstraction at which we as programmers work, from logic encoded in hardware to toggle switches representing binary digits, through machine code, assembly language, low-level languages, and high-level languages both procedural and functional. More recently,...

Droid Companion
Droid Companion

Congratulations on your new Droid smartphone! You’re going to be amazed when you discover all the ways it enables you to connect with your contacts and stay in touch with the world. You can communicate via talk, text, email, social networking, and chatting with instant messaging, and on some newer Droid phones, you may even be able to...

Raspberry Pi for Secret Agents
Raspberry Pi for Secret Agents

Turn your Raspberry Pi into your very own secret agent toolbox with this set of exciting projects!

Overview

  • Detect an intruder on camera and set off an alarm
  • Listen in or record conversations from a distance
  • Find out what the other computers on your network are up to
  • ...
Software Manual for the Elementary Functions (Prentice-Hall series in computational mathematics)
Software Manual for the Elementary Functions (Prentice-Hall series in computational mathematics)
This manual is intended to provide guidance towards the preparation and testing of elementary function subroutines for non-vector oriented digital computers. We believe it will be useful to systems programmers, teachers, students of numerical analysis, hobbyists and anyone else concerned or curious about how the elementary...
The Theory of Everything: The Origin and Fate of the Universe
The Theory of Everything: The Origin and Fate of the Universe

In this series of lectures I shall try to give an outline of what we think is the history of the universe from the big bang to black holes. In the first lecture I shall briefly review past ideas about the universe and how we got to our present picture. One might call this the history of the history of the universe.

In the second...

Eloquent Ruby (Addison-Wesley Professional Ruby Series)
Eloquent Ruby (Addison-Wesley Professional Ruby Series)

Do you know why experienced Ruby programmers tend to reach for basic collections and hashes while programmers from other languages go for more specialized classes? Do you know the difference between strip, chop, and chomp, and why there are three such similar methods when apparently one might suffice? (Not to mention lstrip and...

No Such Thing as Small Talk: 7 Keys to Understanding German Business Culture
No Such Thing as Small Talk: 7 Keys to Understanding German Business Culture

Many business leaders, when they begin to work overseas or interact professionally with teams abroad, are surprised by how much they thought they knew about the other culture, but how little it counts for on the ground. The reality is that communication is multi-dimensional, and simply knowing a foreign language doesn't mean one...

Making Things Talk: Practical Methods for Connecting Physical Objects
Making Things Talk: Practical Methods for Connecting Physical Objects
Building electronic projects that interact with the physical world is good fun. But when devices that you've built start to talk to each other, things really start to get interesting. Through a series of simple projects, you'll learn how to get your creations to communicate with one another by forming networks of smart devices that carry on...
unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy