Tags
Language
Tags
March 2007
Su Mo Tu We Th Fr Sa
25 26 27 28 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    New Chess Books 3

    Posted By: darkseed
    New Chess Books 3

    New Chess Books 3

    1997 | Charuchin, V. - Chess Comet Charousek | djvu | 6813 KB
    2003 | Palliser, R. - Play 1 d4! | djvu | 5366 KB
    1992 | Solovyov, S. - Bobby Fischer 1 - 1955-1960 | djvu | 13655 KB
    1992 | Solovyov, S. - Bobby Fischer 2 - 1961-1967 | djvu | 11911 KB
    1993 | Solovyov, S. - Bobby Fischer 3 - 1968-1992 | djvu | 10510 KB
    2002 | Aagaard, J & Lund, E. - Meeting 1 d4 | djvu | 3052 KB
    2001 | Dunnington, A. - Attacking with 1 d4 | djvu | 3016 KB
    1998 | Solovyov, S. - Emanuel Lasker 1 - Games 1889-1903 | djvu | 13216 KB
    1998 | Solovyov, S. - Emanuel Lasker 2 - Games 1904-1940 | djvu | 14149 KB
    1997 | Lane, G. - The Grand Prix Attack | djvu | 2506 KB
    1996 | Pickard, S. - The Chess Games of Adolph Anderssen | djvu | 5729 KB

    These are all my own scans, so the quality is good!
    ISBNs on the backcovers!

    Practical Foundation Engineering Handbook, 2nd Edition

    Posted By: Culin
    Practical Foundation Engineering Handbook, 2nd Edition

    Practical Foundation Engineering Handbook, 2nd Edition
    By Robert Wade Brown(Editor) | ISBN: 0071351396 | McGraw-Hill Professional Publishing | 2000-09-22 | 2nd Edition | 1228 Pages | 26 Mb
    Standard and advanced methods for every type of foundation engineering

    Incorporating the expertise of a distinguished team of soil and foundation engineers, this expanded and updated Handbook clarifies and simplifies every part of the job, from site assessment through design and construction, to remediation of failed foundations. Here are proven, expert design alternatives for even substandard soil and challenging site conditions, with example problems for any type of structure.

    The Essential Guide to Flex 2 with ActionScript 3.0 by Charles E Brown

    Posted By: Alexpal
    The Essential Guide to Flex 2 with ActionScript 3.0 by  Charles E Brown

    The Essential Guide to Flex 2 with ActionScript 3.0 by Charles E Brown (Author)
    Publisher: friends of ED (February 26, 2007) | ISBN-10: 1590597338 | PDF | 20 Mb | 520 pages

    Flex 2 represents something of a revolution in web applications. It is the next evolutionary step of Flash, which has grown from a web animation tool to a powerful enterprise web design and development tool. with nearly 98% of all web browsers and cellular phones running the Flash player needed to use Flash and Flex applications, knowledge of Flex is indispensable for any serious web designer and developer.

    GPRS and 3G Wireless Applications: Professional Developer's Guide by Christoffer Andersson

    Posted By: Alexpal
    GPRS and 3G Wireless Applications: Professional Developer's Guide by  Christoffer Andersson

    GPRS and 3G Wireless Applications: Professional Developer's Guide by Christoffer Andersson (Author)
    Publisher: John Wiley & Sons; (April 11, 2001) | ISBN-10: 0471414050 | PDF | 4,2 Mb | 336 pages

    To ensure competitive advantage for their companies in wireless product development, developers need to understand how wireless technologies work, what impact they have on applications being developed, and how to use them to optimize products for success in the marketplace. Designed to answer these and other wireless development questions, this unique handbook explores how a host of relevant technologies work together with the new worldwide standards for wireless technologies–General Packet Radio Service (GPRS) and Third Generation (3G). Leading expert Christoffer Andersson clearly explains how GPRS and 3G control the mobile environment, then goes on to describe how the emerging radio technology of Bluetooth fits in with WAP and Java, how wireless applications work with HTTP and TCP/IP on the Internet, and how to create "always-on" wireless applications.

    JavaScript Bible, Fifth Edition by Danny Goodman

    Posted By: Alexpal
    JavaScript Bible, Fifth Edition by  Danny Goodman

    JavaScript Bible, Fifth Edition by Danny Goodman (Author), Michael Morrison (Author)
    Publisher: Wiley; 5 Pap/Cdr edition (March 19, 2004) | ISBN-10: 0764557432 | PDF | 25,3 Mb | 336 pages

    Leading Strategic Change: Breaking Through the Brain Barrier by J. Stewart Black

    Posted By: Alexpal
    Leading Strategic Change: Breaking Through the Brain Barrier by  J. Stewart Black

    Leading Strategic Change: Breaking Through the Brain Barrier by J. Stewart Black (Author), Hal B. Gregersen (Author)
    Publisher: FT Press; 1st edition (June 23, 2003) | ISBN-10: 0131303198 | PDF | 4,6 Mb | 224 pages

    Photoshop Restoration & Retouching, Second Edition by Katrin Eismann

    Posted By: Alexpal
    Photoshop Restoration & Retouching, Second Edition by  Katrin Eismann

    Photoshop Restoration & Retouching, Second Edition by Katrin Eismann (Author), Doug Nelson (Author)
    Publisher: New Riders Press; 2 edition (July 21, 2003) | ISBN-10: 0735713502 | PDF | 80 Mb | 384 pages

    Learn to remove wrinkles, unwanted backgrounds or color casts, image flaws or 10extra pounds so images look better than reality. Photoshop Restoration andRetouching, 2/E has been updated with new techniques, new projects, and new screenshots. It will take you through numerous step-by-step examples that highlight the tools and techniques used by professional digital artists to restore valuable antique images, retouch portraits and enhance glamour photography. This book features dozens of tutorials that will show users of all skill levels how to transform faded, damaged photographs intobeautiful images that are as clear and crisp as the day they were taken.

    SSL & TLS Essentials: Securing the Web

    Posted By: Ed
    SSL & TLS Essentials: Securing the Web

    SSL & TLS Essentials: Securing the Web
    ISBN-10: 0471383546 | English | PDF | 1.0 Mb (rar) | 212 Pages | Publisher: Wiley (February 2000)

    "Great writing . . . a clear introduction to the most widely deployed security technology in the Internet."-Paul Lambert, former co-chair of IETF IPSEC working group

    The Secure Sockets Layer (SSL) and Transport Layer Security(TLS) protocols form the foundation for e-commerce security on the World Wide Web, verifying the authenticity of Web sites, encrypting the transfer of sensitive data, and ensuring the integrity of information exchanged. Now-for the first time the details of these critical security protocols are available in a complete, clear, and concise reference. SSL and TLS Essentials provides complete documentation of the SSL and TLS protocols, including advanced and proprietary extensions never before published. The book thoroughly covers the protocols in operation, including the contents of their messages, message formats, and the cryptographic calculations used to construct them. The text also includes an introduction to cryptography and an explanation of X.509 public key certificates. Stephen Thomas, author of IPng and the TCP/IP Protocols, presents this complex material in a clear and reader-friendly manner. The book includes more than 80 figures and illustrations to supplement its text, and it describes SSL in the context of real-world, practical applications. Readers will immediately understand not only the academic principles behind he security protocols, but how those principles apply to their own network security challenges.

    UML for the IT Business Analyst

    Posted By: macworld
    UML for the IT Business Analyst

    UML for the IT Business Analyst
    English | PDF Format | 400 pages | ISBN-13: 978-1592009121 | Course Technology PTR; 1 edition (June 7, 2005) | 4.11 MB

    The IT Business Analyst is one of the fastest growing roles in the IT industry. Business Analysts are found in almost all large organizations and are important members of any IT team whether in the private or public sector. ?UML for the IT Business Analyst? provides a clear, step-by-step guide to how the Business Analyst can perform his or her role using state-of-the-art object-oriented technology. Business analysts are required to understand object-oriented technology although there are currently no other books that address their unique needs as non-programmers using this technology. Assuming no prior knowledge of business analysis, IT, or object-orientation, material is presented in a narrative, chronological, hands-on style using a real-world case study. Upon completion of ?UML for the IT Business Analyst,? you will have created an actual business requirements document using all of the techniques of object-orientation required of a Business Analyst. ?UML for the IT Business Analyst? puts together all of the technology pieces needed to proficiently perform the Business Analyst role.

    Skinning Windows XP

    Posted By: Ed
    Skinning Windows XP


    Skinning Windows XP

    | ISBN-10: 078973348X | English | CHM | 18.4 Mb (rar) | 336 Pages | Publisher: Que (April 15, 2005) |


    Book Description

    When you pick out something to wear in the morning, you choose the clothes that best fit your mood and personality that day. Same with the music we listen to and even the cars we drive. We instinctively surround ourselves with the things that are reflective of our personalities, so why not our computers? Skinning Windows XP will show you how to take the Microsoft Windows Graphical User Interface to a whole new visual and functional level. Through step-by-step instructions, you will learn how to customize your Windows XP theme, icons and backgrounds using skinning software. Not sure what skinning software is or where to find it? You'll learn about that, too. You will become familiar with the Windows desktop structure and components and learn how to alter the elements to create a personalized desktop experience. Along with a 16-page, full-color insert with before and after shots of skins for inspiration, Skinning Windows XP will help you technologically express yourself.


    Trust in Knowledge Management and Systems in Organizations

    Posted By: macworld
    Trust in Knowledge Management and Systems in Organizations

    Trust in Knowledge Management and Systems in Organizations
    English | PDF Format | 296 pages | ISBN-13: 978-1591401261 | Idea Group Publishing (October 2, 2003) | 2.28 MB



    Book Info
    Text introduces new concepts and examines new types of trust emerging along with the development of the network economy. Provides an extensive description of trust in relation to knowledge and information-intensive, knowledge-based activities within organizations, networks, and beyond. Hardcover, softcover available. DLC: Knowledge management.

    The Semantic Web: A Guide to the Future of XML

    Posted By: macworld
    The Semantic Web: A Guide to the Future of XML

    The Semantic Web: A Guide to the Future of XML
    English | PDF Format | 312 pages | ISBN-13: 978-0471432579 | Wiley (May 30, 2003) | 8.30 MB


    Review
    "…It is perfectly pitched at the level of computer-literate managers…" (British Journal of Healthcare Computing, February 2004

    Security Warrior

    Posted By: Ed
    Security Warrior


    Security Warrior

    | ISBN-10: 0596005458 | English | CHM | 4.7 Mb (rar) | 552 Pages | Publisher: O'Reilly Media; 1 edition (February 1, 2004) |


    Book Description
    When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm. What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle. Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines – trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability. Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf–and in your hands.

    Speech Separation by Humans and Machines

    Posted By: macworld
    Speech Separation by Humans and Machines

    Speech Separation by Humans and Machines
    English | PDF Format | 319 pages | ISBN-13: 978-1402080012 | Springer; 1 edition (November 2, 2004) | 9.98 MB

    The "~censored~-party effect" - the ability to focus on one voice in a sea of noises - is a highly sophisticated skill that is usually effortless to listeners but largely impossible for machines. Investigating and unravelling this capacity spans numerous fields including psychology, physiology, engineering, and computer science. All these perspectives are brought together in this volume which, for the first time, provides a comprehensive and authoritative discussion of our understanding of how humans separate speech, and the state of the art in approaching these abilities with machines. This material is drawn from an October 2003 workshop, sponsored by the National Science Foundation, on speech separation. Leading authorities from around the world were invited to present their perspectives and discuss the points of contact to other perspectives. The result is a clear and uniform overview of this problem, and a primer in what is emerging as an important, active and successful area for the development of new techniques and applications. Chapters include historical and current summaries of relevant research in behavioral science, neuroscience and engineering, along with more in-depth descriptions of several of the most exciting current research projects and techniques, including the latest experimental results illuminating how listeners organize the mixtures of sound they hear, and the most powerful and successful signal processing and machine learning techniques for the separation of real-world recordings of sound mixtures by one or more microphones. There is no comparable collection that seeks to bring together the underlying experimental science and the wide variety of technical approaches to give an integrated picture of the problem and solutions to speech separation. Those specializing in speech science, hearing science, neuroscience, or computer science and engineers working on applications such as automatic speech recognition, cochlear implants, hands-free telephones, sound recording, multimedia indexing and retrieval will find Speech Separation by Humans and Machines a useful and inspiring read.

    Smart Environments: Technology, Protocols and Applications

    Posted By: macworld
    Smart Environments: Technology, Protocols and Applications

    Smart Environments: Technology, Protocols and Applications
    English | PDF Format | 432 pages | ISBN-13: 978-0471544487 | Wiley-Interscience (November 2, 2004) | 3.42 MB


    Book Description
    Smart Environments contains contributions from leading researchers, describing techniques and issues related to developing and living in intelligent environments. Reflecting the multidisciplinary nature of the design of smart environments, the topics covered include the latest research in smart environment philosophical and computational architecture considerations, network protocols for smart environments, intelligent sensor networks and powerline control of devices, and action prediction and identification.