Home | Amazing | Today | Tags | Publishers | Years | Search 
Freedom Fighters (Prima's Official Strategy Guide)
Freedom Fighters (Prima's Official Strategy Guide)
Freedom Fighters is a game of tactical combat, or what some like to refer as a thinking shooter. Unlike most shooter games, which send a player through an essentially linear course, killing everything in sight, or others that require the player to find special keys or cards to get through a locked door, Freedom Fighters lets the player concentrate...
Marketing Fear in America's Public Schools: The Real War on Literacy
Marketing Fear in America's Public Schools: The Real War on Literacy
We begin and end this book with chapters on resistance to the agendas of the corporate and political right. In chapter two, Carole Edelsky provocatively outlines both the problem of and the resistance to the marketing of fear being perpetuated by the corporate and political right. She uncovers how teachers known for their critical, holistic...
Essential Software Testing: A Use-Case Approach
Essential Software Testing: A Use-Case Approach
Much has been written about the difficulty of software testing. Often these laments are accompanied by cautionary words about how careful one has to be to ensure testing is done properly. However, there is a dearth of resources that give practical guidance on the nuts and bolts of testing. Essential Software Testing: A Use-Case...
Macs Portable Genius
Macs Portable Genius
Some less-than-charitable folks insist on calling Mac users a “cult.” Why? Well, who knows, really? Perhaps it’s because people who use a Mac actually enjoy using a computer, as opposed to folks using other systems who seem to wage a daily war to stop themselves from putting a fist through their screens. Perhaps it’s because...
Nessus Network Auditing, Second Edition
Nessus Network Auditing, Second Edition
In the war zone that is the modern Internet, manually reviewing each networked system for security fl aws is no longer feasible. Operating systems, applications, and network protocols have grown so complex over the last decade that it takes a dedicated security administrator to keep even a relatively small network shielded from attack.
...
Information Warfare: corporate attack and defence in a digital world (Computer Weekly Professional)
Information Warfare: corporate attack and defence in a digital world (Computer Weekly Professional)
The idea for this book came out of a need to find a text for a unit in Information Warfare given to Doctor of Business Administration students. Most of the existing texts had a military flavour and so did not suit our task. Others concentrated on security aspects and assumed some level of knowledge in this area. What we wanted was a text that...
Cyber Crime Investigator's Field Guide, Second Edition
Cyber Crime Investigator's Field Guide, Second Edition
In the past 30 years, growth in the area of data communications has been phenomenal, to say the least. During the Vietnam War, one of my duty stations was on an island in the China Sea. I was part of a signal intelligence group, intercepting and decoding wartime communications traffic. We did our best to decode and analyze the information we...
Atoms And Materials (Physics in Our World)
Atoms And Materials (Physics in Our World)
JET AIRPLANES MADE their first appearance during World War II (1939–1945), almost 40 years after American inventors Orville and Wilbur Wright built and flew the first airplane. Although jet engines are powerful and efficient, early airplanes had to settle for slow, cumbersome propellers, driven by piston engines quite similar to automobile...
Joe Celko's Analytics and OLAP in SQL (The Morgan Kaufmann Series in Data Management Systems)
Joe Celko's Analytics and OLAP in SQL (The Morgan Kaufmann Series in Data Management Systems)
The First book that teaches what SQL programmers need in order to successfully make the transition from transactional systems (OLTP) into the world of OLAP.

Before SQL programmers could begin working with OLTP (On-Line Transaction Processing) systems, they had to unlearn procedural, record-oriented programming before moving
...
Digitally Archiving Cultural Objects
Digitally Archiving Cultural Objects
A large number of cultural heritage objects around the world are deteriorating or being destroyed due to the work of natural disasters, such as earthquakes and floods, and human-inflicted destruction, such as war and vandalism. In the wake of these threats, 3D data becomes a critical component to permanently recording the shapes of these important...
The Annotated Turing: A Guided Tour Through Alan Turing's Historic Paper on Computability and the Turing Machine
The Annotated Turing: A Guided Tour Through Alan Turing's Historic Paper on Computability and the Turing Machine

Before digital computers ever existed, Alan Turing envisioned their power and versatility...but also proved what computers could never do.

In an extraordinary and ultimately tragic life that unfolded like a novel, Turing helped break the German Enigma code to turn the tide of World War II, later speculated on...

Turing (A Novel about Computation)
Turing (A Novel about Computation)
Our hero is Turing, an interactive tutoring program and namesake (or virtual emanation?) of Alan Turing, World War II code breaker and father of computer science. In this unusual novel, Turing's idiosyncratic version of intellectual history from a computational point of view unfolds in tandem with the story of a love affair involving Ethel, a...
Result Page: 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy