Home | Amazing | Today | Tags | Publishers | Years | Search 
The LEGO Adventure Book, Vol. 2: Spaceships, Pirates, Dragons & More!
The LEGO Adventure Book, Vol. 2: Spaceships, Pirates, Dragons & More!

Join Megs and Brickbot on another exciting tour of LEGO® building in this second volume of The LEGO Adventure Book series. As they track the Destructor and rebuild the models he destroys, you'll follow along and meet some of the world's best builders. Learn to create sleek spaceships, exotic pirate hideaways,...

The Tigre Language of Ginda, Eritrea: Short Grammar and Texts (Studies in Semitic Languages and Linguistics)
The Tigre Language of Ginda, Eritrea: Short Grammar and Texts (Studies in Semitic Languages and Linguistics)

In "The Tigre Language of Ginda, Eritrea," David L. Elias documents the dialect of the Tigre language that is spoken in the town of Ginda in eastern Eritrea. While the language of Tigre is spoken by perhaps one million people in Eritrea and Sudan, the population of Ginda is fewer than 50,000 people. Elias describes basic aspects of...

Development with the Force.com Platform: Building Business Applications in the Cloud (3rd Edition) (Developer's Library)
Development with the Force.com Platform: Building Business Applications in the Cloud (3rd Edition) (Developer's Library)

Master Force.com, Today’s Fastest, Most Flexible Cloud Development Platform

 

With Salesforce.com’s Force.com platform, you can build and deploy powerful cloud-based enterprise applications faster than ever before. Now, Jason Ouellette gives you...

Cuckoo Malware Analysis
Cuckoo Malware Analysis

Analyze malware using Cuckoo Sandbox

Overview

  • Learn how to analyze malware in a straightforward way with minimum technical skills
  • Understand the risk of the rise of document-based malware
  • Enhance your malware analysis concepts through illustrations, tips and tricks,...
Cryptography: Cracking Codes (Intelligence and Counterintelligence)
Cryptography: Cracking Codes (Intelligence and Counterintelligence)

While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryptionessentially the need to code information...

Online Damage Detection in Structural Systems: Applications of Proper Orthogonal Decomposition, and Kalman and Particle Filters (SpringerBriefs in Applied Sciences and Technology)
Online Damage Detection in Structural Systems: Applications of Proper Orthogonal Decomposition, and Kalman and Particle Filters (SpringerBriefs in Applied Sciences and Technology)

This monograph assesses in depth the application of recursive Bayesian filters in structural health monitoring. Although the methods and algorithms used here are well established in the field of automatic control, their application in the realm of civil engineering has to date been limited. The monograph is therefore intended as a reference...

More iPhone Development with Objective-C
More iPhone Development with Objective-C

If you are looking to extend your iOS programming skills beyond the basics then More iPhone Development with Objective-C is for you. Authors Dave Mark, Jayant Varma, Jeff LaMarche, Alex Horovitz, and Kevin Kim explain concepts as only they...

Managing IaaS and DBaaS Clouds with Oracle Enterprise Manager Cloud Control 12c
Managing IaaS and DBaaS Clouds with Oracle Enterprise Manager Cloud Control 12c

Setting up a cloud environment is rarely smooth sailing but with this guide to Oracle Enterprise Manager Cloud Control, it just got a lot more manageable. Practical advice and lots of examples make it the ideal assistant.

Overview

  • Perform and set up your cloud environment one step at a time using this...
Sustainability in Energy and Buildings: Proceedings of the 3rd International Conference on Sustainability in Energy and Buildings (SEB´11) (Smart Innovation, Systems and Technologies)
Sustainability in Energy and Buildings: Proceedings of the 3rd International Conference on Sustainability in Energy and Buildings (SEB´11) (Smart Innovation, Systems and Technologies)

Welcome to the proceedings of the Third International Conference on Sustainability in Energy and Buildings, SEB’11, held in Marseilles in France, organised by the Laboratoire des Sciences del'Information et des Systèmes (LSIS) in Marseille, France in partnership with KES International.

SEB'11 formed a welcome...

Unmasking the Social Engineer: The Human Element of Security
Unmasking the Social Engineer: The Human Element of Security

Learn to identify the social engineer by non-verbal behavior

Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and...

Solid State Chemistry and its Applications
Solid State Chemistry and its Applications

Solid State Chemistry and its Applications, 2nd Edition: Student Edition is an extensive update and sequel to the bestselling textbook Basic Solid State Chemistry, the classic text for undergraduate teaching in solid state chemistry worldwide.

Solid state chemistry lies at the heart of many significant scientific...

PowerShell Deep Dives
PowerShell Deep Dives

Summary

Here's your chance to learn from the best in the business. PowerShell Deep Dives is a trove of essential techniques, practical guidance, and the expert insights you earn only through years of experience. Editors Jeffery Hicks, Richard Siddaway, Oisin Grehan, and Aleksandar Nikolic hand-picked...

Result Page: 2768 2767 2766 2765 2764 2763 2762 2761 2760 2759 2758 2757 2756 2755 2754 2753 2752 2751 2750 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy