Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
2600: The Hacker Quarterly, Summer 2002
2600: The Hacker Quarterly, Summer 2002
2600: The Hacker Quarterly, Summer 2002:

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well as
...
You Are a Mathematician: A Wise and Witty Introduction to the Joy of Numbers
You Are a Mathematician: A Wise and Witty Introduction to the Joy of Numbers

What is the largest number less than 1?

If x and y are any of two different positive numbers, which is larger, x2 + y2 or 2xy?

What do you get if you cross a cube and an octahedron?

Discover the surprising answers as David Wells conclusively proves that: you Are a mathematician

Praise for David Wells's

The...

Modeling and Computation in Engineering II
Modeling and Computation in Engineering II

Modeling and Computation in Engineering II (CMCE 2013, Hong Kong, 22-23 June 2013) includes 50 contributions on modeling and simulation technology, which were presented at the 2nd SREE Conference on Modeling and Computation in Engineering (CMCE 2013) and the 3rd SREE Workshop on Applied Mechanics and Civil Engineering...

The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Uncover, exploit, and close security holes in any software or operating system

Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This...

2600: The Hacker Quarterly, Winter 2002-2003
2600: The Hacker Quarterly, Winter 2002-2003
2600: The Hacker Quarterly, Winter 2002-2003

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects
...
Revolution in The Valley: The Insanely Great Story of How the Mac Was Made
Revolution in The Valley: The Insanely Great Story of How the Mac Was Made

There was a time, not too long ago, when the typewriter and notebook ruled, and the computer as an everyday tool was simply a vision. Revolution in the Valley traces this vision back to its earliest roots: the hallways and backrooms of Apple, where the groundbreaking Macintosh computer was born. The book traces the development of the...

Freax
Freax

THE HISTORY OF THE COMPUTER DEMOSCENE

Freax is a fast-paced, comprehensive look at the amazing stories of the digital art community known as the "demoscene". For over 20 years, computer programmers, artists and musicians have tweaked, optimized and pushed computers to their limits... all for the sake of...

Sams Teach Yourself Samba in 24 Hours (2nd Edition)
Sams Teach Yourself Samba in 24 Hours (2nd Edition)
When Linux or Unix gets adopted by computing groups that already have users working with a version of the Windows platform, administrators overseeing the network integration of the two operating systems look to Samba to make a connection. Sams Teach Yourself Samba in 24 Hours furnishes 24 one-hour essential lessons geared toward...
2600: The Hacker Quarterly, Spring 2003
2600: The Hacker Quarterly, Spring 2003
2600: The Hacker Quarterly, Spring 2003

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet
...
2600: The Hacker Quarterly, Spring 2005
2600: The Hacker Quarterly, Spring 2005
2600: The Hacker Quarterly, Spring 2005

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well
...
Hackers: Heroes of the Computer Revolution - 25th Anniversary Edition
Hackers: Heroes of the Computer Revolution - 25th Anniversary Edition

This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers -- those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from...

Animal Rights: A Reference Handbook (Contemporary World Issues)
Animal Rights: A Reference Handbook (Contemporary World Issues)

the controversy surrounding animal rights is divisive and potentially volatile. It divides society into three unequally sized groups. The first group is comprised of animal activists who believe that all human use of animals should stop immediately. The second group is society in general, which may or...

Result Page: 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy