Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hackers eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the worlds foremost true hackers unleash the power of OS X for everything form cutting edge research...
Elastic Beanstalk
Elastic Beanstalk

Thank you for picking up a copy of this book. Amazon Elastic Beanstalk is one of Amazon AWS’s services. It offers a platform for easy deployment of web applications. The first version of Elastic Beanstalk handles Java applications running in a Tomcat container. Deploying an application has been made as easy as uploading your WAR...

John P. Slough: The Forgotten Civil War General
John P. Slough: The Forgotten Civil War General

John Potts Slough, the Union commander at the Battle of Glorieta Pass, lived a life of relentless pursuit for success that entangled him in the turbulent events of mid-nineteenth-century America. As a politician, Slough fought abolitionists in the Ohio legislature and during Kansas Territory's fourth and final constitutional...

Drug Use for Grown-Ups: Chasing Liberty in the Land of Fear
Drug Use for Grown-Ups: Chasing Liberty in the Land of Fear
“Hart’s argument that we need to drastically revise our current view of illegal drugs is both powerful and timely . . . when it comes to the legacy of this country’s war on drugs, we should all share his outrage.” —The New York Times Book Review

From one of the world's
...
Border and Rule: Global Migration, Capitalism, and the Rise of Racist Nationalism
Border and Rule: Global Migration, Capitalism, and the Rise of Racist Nationalism

In Border and Rule, one of North America’s foremost thinkers and immigrant rights organizers delivers an unflinching examination of migration as a pillar of global governance and gendered racial class formation.

Harsha Walia disrupts easy explanations for the migrant and refugee
...

The Algorithm Design Manual
The Algorithm Design Manual
This expanded and updated second edition of a classic bestseller continues to take the "mystery" out of designing and analyzing algorithms and their efficacy and efficiency. Expanding on the highly successful formula of the first edition, the book now serves as the primary textbook of choice for any algorithm design course while...
Bengal 2021 : An Election Diary
Bengal 2021 : An Election Diary
"On 20 May 2011, Mamata Banerjee was sworn in as the first female chief minister of West Bengal, bringing an end to thirty-three years of CPI(M) rule. ‘Poriborton!’ screamed the morning papers, echoing Trinamool Congress’s catchphrase for bringing in change. A decade later, amidst allegations against the TMC of political...
Camping Grounds: Public Nature in American Life from the Civil War to the Occupy Movement
Camping Grounds: Public Nature in American Life from the Civil War to the Occupy Movement
An exploration of the hidden history of camping in American life that connects a familiar recreational pastime to camps for functional needs and political purposes.

Camping appears to be a simple proposition, a time-honored way of getting away from it all. Pack up the car and hit the road in search of a
...
The Hunt for Mount Everest
The Hunt for Mount Everest

The height of Mt. Everest was first measured in 1850, but the closest any westerner got to Everest during the next 71 years, until 1921, was 40 miles. The Hunt for Mt. Everest tells the story of the 71-year quest to find the world's highest mountain. It's a tale of high drama, of larger-than-life characters-George...

Between Two Kingdoms: A Memoir of a Life Interrupted
Between Two Kingdoms: A Memoir of a Life Interrupted
NEW YORK TIMES BESTSELLER • A searing, deeply moving memoir of illness and recovery that traces one young woman’s journey from diagnosis to remission to re-entry into “normal” life—from the author of the Life, Interrupted column in The New York Times

...
Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
"Few false ideas have more firmly gripped the minds of so many intelligent men than the one that, if they just tried, they could invent a cipher that no one could break," writes David Kahn in this massive (almost 1,200 pages) volume. Most of The Codebreakers focuses on the 20th century, especially World War II. But its reach is...
unlimited object storage image
Result Page: 41 40 39 38 37 36 35 34 33 32 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy