Home | Amazing | Today | Tags | Publishers | Years | Search 
Net Crimes & Misdemeanors: Outmaneuvering Web Spammers, Stalkers, and Con Artists
Net Crimes & Misdemeanors: Outmaneuvering Web Spammers, Stalkers, and Con Artists
If you are reading this book or thinking about acquiring it, you have taken an important step toward increasing your awareness of the ways in which the Internet may be abused. J. A. Hitchcock has prepared a second edition of her popular book, Net Crimes and Misdemeanors, reflecting new ways in which you may encounter the dark side of global...
The Traveler's Web: An Extreme Searcher Guide to Travel Resources on the Internet
The Traveler's Web: An Extreme Searcher Guide to Travel Resources on the Internet
According to a recent survey by the Travel Industry Association of America, nearly 80 million Americans turned to the Internet for help with travel planning in 2005. The same survey reports that the Internet is now used for some aspect of travel planning in more than 75 percent of all trips. You can count on these numbers rising in the years ahead....
The Extreme Searcher's Internet Handbook: A Guide for the Serious Searcher, Second Edition
The Extreme Searcher's Internet Handbook: A Guide for the Serious Searcher, Second Edition
"A phenomenal resource for both extreme and not-so-extreme researchers. Great tips, clear explanations, and years of expertise distilled into 250 pages of clear, engaging text. This book should be on every searcher's desk."  —Mary Ellen Bates, coauthor, Researching Online for Dummies

The
...
Frogs into Princes: Neuro Linguistic Programming
Frogs into Princes: Neuro Linguistic Programming

NLP is an explicit and powerful model of human experience and communication. Using the principles of NLP it is possible to describe any human activity in a detailed way that allows you to make many deep and lasting changes quickly and easily. A few specific examples of things you can learn to accomplish are: (1) cure phobias and other...

Using Your Brain--For a Change: Neuro-Linguistic Programming
Using Your Brain--For a Change: Neuro-Linguistic Programming

How often have you heard the phrase, "She has a bright future" or, "He has a colorful past"? Expressions like these are more than metaphors. They are precise descriptions of the speaker's internal thinking, and these descriptions are the key to learning how to change your own experience in useful ways. For instance,...

Change Your Mind-And Keep the Change : Advanced NLP Submodalities Interventions
Change Your Mind-And Keep the Change : Advanced NLP Submodalities Interventions

This advanced NLP book builds on the foundation established in Heart of the Mind, by the Andreases, and Using Your Brain—for a CHANGE, by Richard Bandler. Presented in "live seminar" format, this book offers rich information and specific examples of how to work successfully in helping people change. Specific methods are...

How to Make the Most of a Flying Saucer Experience
How to Make the Most of a Flying Saucer Experience

Finally, a useful book about UFOs! It's Professor Solomon's guide to UFOs - specifically, his comprehensive study of the flying saucer phenomenon. In this scholarly yet entertaining work, the Professor delves into UFO legend and lore particularly that of the contactees of the 1950s.

He also presents a biography of
...

The complete book of beer drinking games (and other really important stuff)
The complete book of beer drinking games (and other really important stuff)
The Complete Book Of Beer Drinking Games lives up to its name with descriptions of fifty hilarious beer games like "Thumper and Quarters" to obscure but wild matches like "Slush Fund" and "Boot-a-Bout". The Complete Book Of Beer Drinking Games celebrates a popular pastime for "towns & gowns" young adults...
Out of the Inner Circle: A Hacker's Guide to Computer Security
Out of the Inner Circle: A Hacker's Guide to Computer Security

This book tells you about many of the experiences and stories that were part of my life as a sixteen-year-old hacker. I've tried where possible to make references general, rather than specific, to avoid giving you the impression that a particular hacking approach or technique always works on a single type or class of computer system....

Theory of Relational Databases
Theory of Relational Databases
This book is a revision and extension of notes I wrote for a graduate seminar in relational database theory given at Stony Brook. The purpose of that course was to give students enough background in relational database theory to enable them to understand the current research being done in the field. I have not attempted to be exhaustive in covering...
Geometric Computing Science: First Steps (Interdisciplinary Mathematics, Vol 25)
Geometric Computing Science: First Steps (Interdisciplinary Mathematics, Vol 25)
This book outlines a mathematical way of thinking about the interaction of 'pure' and 'applied' computer science. I will be more subjective than is customary in science and mathematics exposition and sketch my personal vision, in terms of my own experience in pure and applied mathematics and my extensive readings in the scholarly computer science...
Intel OEM Systems Handbook
Intel OEM Systems Handbook

The cover design is an abstract portrayal of Intel's computer systems products as the building blocks of systems development. The building blocks meld together, encompassing the heart of an open system, which is symbolized by the pyramid at the heart of the architecture. This melding or flexibility is the key Intel pres to the design...

Result Page: Previous 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy