Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Path of Daggers (The Wheel of Time, Book 8)
The Path of Daggers (The Wheel of Time, Book 8)

The #1 internationally bestselling saga that began with The Eye of the World has reached new popularity with each volume. Now the phenomenal tale continues.With the Seanchan invasion force in possession of Ebou Dar, Nynaeve, Elayne and Aviendha head for Caemlyn and Elayne's rightful throne, but discover a worse enemy than the Seanchan. In...

Advanced UNIX Programming (Sams White Book Series)
Advanced UNIX Programming (Sams White Book Series)
Advanced UNIX Programming goes beyond the fundamentals of UNIX programming and presents information and techniques the readers needs to expand their knowledge base. Designed for professional UNIX programmers, this book builds on the skills and knowledge the reader already possesses. It includes coverage of internet processes, interprocess control,...
Siege: Trump Under Fire
Siege: Trump Under Fire

Michael Wolff, author of the bombshell bestseller Fire and Fury, once again takes us inside the Trump presidency to reveal a White House under siege.

Just one year into Donald Trump’s term as president, Michael Wolff told the electrifying story of a White House consumed by controversy, chaos, and...

Simulating Humans: Computer Graphics Animation and Control
Simulating Humans: Computer Graphics Animation and Control

The decade of the 80's saw the dramatic expansion of high performance computer graphics into domains previously able only to irt with the technology. Among the most dramatic has been the incorporation of real-time interactive manipulation and display for human gures. Though actively pur- sued by several research groups, the...

My War Criminal: Personal Encounters with an Architect of Genocide
My War Criminal: Personal Encounters with an Architect of Genocide

An investigation into the nature of violence, terror, and trauma through conversations with a notorious war criminal by Jessica Stern, one of the world's foremost experts on terrorism.

Between October 2014 and November 2016, global terrorism expert Jessica Stern held a series of conversations in a...

Shooting Digital: Pro Tips for Taking Great Pictures with Your Digital Camera
Shooting Digital: Pro Tips for Taking Great Pictures with Your Digital Camera

"Be part of the revolution."
—Leo Laporte, This Week in Tech

Go beyond the basics to mastery of the art and craft of digital photography in this new edition of the landmark book from award-winning photographer and author Mikkel Aaland. Aaland draws upon his thirty years of experience in the...

True Vision: Authentic Art Journaling
True Vision: Authentic Art Journaling
Ten years ago, I began keeping an art journal out of necessity. I was primarily a photographer, working in medium-format, black-and-white fi lm, but a health concern left me with vision problems.

Each page of this book is packed with material to inspire you. Along with incredible artwork from some...
Professional Pen Testing for Web Applications (Programmer to Programmer)
Professional Pen Testing for Web Applications (Programmer to Programmer)
There is no such thing as "perfect security" when it comes to keeping all systems intact and functioning properly. Good penetration (pen) testing creates a balance that allows a system to be secure while simultaneously being fully functional. With this book, you'll learn how to become an effective penetrator (i.e., a white hat or ethical...
MCITP Developer: Microsoft SQL Server 2005 Data Access Design and Optimization Study Guide: Exam 70-442
MCITP Developer: Microsoft SQL Server 2005 Data Access Design and Optimization Study Guide: Exam 70-442

Get the preparation you need for exam 70-442, PRO: Designing and Optimizing Data Access by Using Microsoft SQL Server 2005, one of two required exams in the Microsoft MCITP: Database Developer certification path. Your essential guide to Microsoft's new SQL Server 2005 certification features practical and in-depth coverage, including:

The Origin and Evolution of the Solar System
The Origin and Evolution of the Solar System

The Origin and Evolution of the Solar System begins by describing historical, i.e. pre-1950, theories and illustrating why they became unacceptable. The main part then critically examines five extant theories, including the current paradigm, the Solar Nebula Theory, to determine how well they fit with accepted scientific principles and...

Optical Fiber Telecommunications V B, Fifth Edition: Systems and Networks (Optics and Photonics Series)
Optical Fiber Telecommunications V B, Fifth Edition: Systems and Networks (Optics and Photonics Series)
Optical Fiber Telecommunications V (A&B) is the fifth in a series that has chronicled the progress in the research and development of lightwave communications since the early 1970s. Written by active authorities from academia and industry, this edition not only brings a fresh look to many essential topics but also focuses on network...
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
With the growing prevalence of the Internet, rootkit technology has taken center stage in the battle between White Hats and Black Hats. Adopting an approach that favors full disclosure, The Rootkit Arsenal presents the most accessible, timely, and complete coverage of rootkit technology. This book covers more topics, in greater depth, than any...
unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy