Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Outsider Art: From the Margins to the Marketplace
Outsider Art: From the Margins to the Marketplace

The term outsider art has been used to describe work produced exterior to the mainstream of modern art by certain self-taught visionaries, spiritualists, eccentrics, recluses, psychiatric patients, criminals, and others beyond the perceived margins of society. Yet the idea of such a raw, untaught creativity remains a...

Android Hardware Interfacing with the BeagleBone Black
Android Hardware Interfacing with the BeagleBone Black

Design and implement Android apps that interface with your own custom hardware circuits and the BeagleBone Black

About This Book

  • Design custom apps that interact with the outside world via BeagleBone Black
  • Modify Android to recognize, configure, and communicate with sensors, LEDs, memory,...
UNIX(R) System Security: A Guide for Users and System Administrators
UNIX(R) System Security: A Guide for Users and System Administrators

Many of the same features that have attracted the corporate and government world to UNIX have made security very difficult to control. This book examines several high-profile security break-ins, and then provides the information necessary to protect a UNIX system from unauthorized access. Covers all the most recent releases of UNIX.

...
Raavan: Enemy of Aryavarta (Ram Chandra)
Raavan: Enemy of Aryavarta (Ram Chandra)

WITHOUT THE DARKNESS, LIGHT HAS NO PURPOSE.

WITHOUT THE VILLAIN, WHAT WOULD THE GODS DO?

INDIA, 3400 BCE.

A land in tumult, poverty and chaos. Most people suffer quietly. A few rebel. Some fight for a better world. Some for themselves. Some don’t give a damn. Raavan. Fathered by one of the...

Animal Visions: Posthumanist Dream Writing (Palgrave Studies in Animals and Literature)
Animal Visions: Posthumanist Dream Writing (Palgrave Studies in Animals and Literature)
Animal Visions considers how literature responds to the harms of anthropocentricism, working with Emily Brontë’s Wuthering Heights (1847) and various adaptations of this canonistic novel to show how posthumanist dream writing unsettles the privileging of the human species over other species. Two feminist...
Project Management: A Systems Approach to Planning, Scheduling, and Controlling
Project Management: A Systems Approach to Planning, Scheduling, and Controlling

This revised edition of the bestselling project management “bible” offers a new, focused presentation of the critical aspects of project management. Written by one of the best-known and respected authorities on the subject, this extraordinary book gives the leaders of today and tomorrow a profound understanding of project...

Sams Teach Yourself Microsoft Office Access 2003 in 24 Hours
Sams Teach Yourself Microsoft Office Access 2003 in 24 Hours
In just 24 lessons of one hour or less, you will be able to work with and design your own Access databases. Using a straightforward, step-by-step approach, each lesson builds on the previous ones, enabling you to learn the essentials of Access 2003 and all its components from the ground up.

Welcome to Sams Teach Yourself Microsoft Office
...
Network Security Foundations : Technology Fundamentals for IT Success
Network Security Foundations : Technology Fundamentals for IT Success
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the...
Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness

Information technology is an increasingly large factor in legal proceedings. In cases large and small, from the U.S. Government's antitrust suit against Microsoft Corporation, to civil lawsuits filed over the failure of a network, to criminal cases in which the authenticity of electronic evidence is questioned, the testimony of a technical...

Foundation ActionScript for Flash 8
Foundation ActionScript for Flash 8
ActionScript is the native scripting language of Flash. ActionScript knowledge is essential within the world of Flash design and development, as Flash remains a leading tool for cutting-edge interactive design and development.

ActionScript is what gives Flash its power, but with that power comes a certain level of complexity, which
...
Computational Intelligence: Engineering of Hybrid Systems
Computational Intelligence: Engineering of Hybrid Systems

Hybrid Intelligent Systems has become an important research topic in computer science and a key application field in science and engineering. This book offers a gentle introduction to the engineering aspects of hybrid intelligent systems, also emphasizing the interrelation with the main intelligent technologies such as genetic algorithms –...

unlimited object storage image
Result Page: 937 936 935 934 933 932 931 930 929 928 927 926 925 924 923 922 921 920 919 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy