Making Users Badass

Badass: Making Users Awesome  eBooks & eLearning

Posted by interes at July 28, 2015
Badass: Making Users Awesome

Badass: Making Users Awesome by Kathy Sierra
English | 2015 | ISBN: 1491919019 | 304 pages | EPUB + MOBI | 10,3 + 27,7 MB

Badass: Making Users Awesome  eBooks & eLearning

Posted by nebulae at March 2, 2015
Badass: Making Users Awesome

Kathy Sierra, "Badass: Making Users Awesome"
English | ISBN: 1491919019 | 2015 | 304 pages | PDF | 34 MB

CardMaker Top Trends in Card Making - May 2017  Magazines

Posted by crazy-slim at Feb. 22, 2017
CardMaker Top Trends in Card Making - May 2017

CardMaker Top Trends in Card Making - May 2017
English | 116 pages | True PDF | 17 MB

National Geographic - Badass Animals (2013)  Video

Posted by notbanned at Feb. 21, 2017
National Geographic - Badass Animals (2013)

National Geographic - Badass Animals (2013)
PDTV | 832x468 | .MP4/AVC @ 2009 Kbps | 43mn 58s | 674 MiB
Audio: English AAC 128 kbps, 2 channels | Subs: None
Genre: Documentary

Reveals the animal underdogs with surprisingly ninja skills. These critters have attitude and will have a go at whoever gets in their way. From cute little Fulmar chicks who spew orange vomit on any intruder to the mantis shrimp with a punch that can shatter glass and the most advanced eyes in the world these creatures are unassuming things that mind their own business but if you bother them you’ll soon know about it. You do not want to mess with Badass animals.

A Practical Guide to UNIX for Mac OS X Users [Repost]  eBooks & eLearning

Posted by naag at Feb. 16, 2017
A Practical Guide to UNIX for Mac OS X Users [Repost]

A Practical Guide to UNIX for Mac OS X Users by Mark G. Sobell
English | Dec. 31, 2005 | ISBN: 0131863339 | 1056 Pages | CHM | 3.3 MB

The Most Useful UNIX Guide for Mac OS X Users Ever, with Hundreds of High-Quality Examples!

Social Media, Social Genres: Making Sense of the Ordinary (repost)  eBooks & eLearning

Posted by interes at Feb. 9, 2017
Social Media, Social Genres: Making Sense of the Ordinary (repost)

Social Media, Social Genres: Making Sense of the Ordinary by Stine Lomborg
English | 2013 | ISBN: 0415828481 | 224 pages | PDF | 1 MB

Information Technology Investment: Decision Making Methodology(Repost)  eBooks & eLearning

Posted by Nice_smile) at Feb. 7, 2017
Information Technology Investment: Decision Making Methodology(Repost)

Information Technology Investment: Decision Making Methodology by Mare J Schniederjans
English | 2004 | ISBN: 9812386955 | 416 Pages | PDF | 14.81 MB

Be My Galentine: Celebrating Badass Female Friendship  eBooks & eLearning

Posted by IrGens at Jan. 31, 2017
Be My Galentine: Celebrating Badass Female Friendship

Be My Galentine: Celebrating Badass Female Friendship by Alicia Clancy
English | January 31, 2017 | ISBN: 1250130859 | EPUB | 144 pages | 15.5 MB

Making in America: From Innovation to Market  eBooks & eLearning

Posted by nebulae at Jan. 25, 2017
Making in America: From Innovation to Market

Suzanne Berger, "Making in America: From Innovation to Market"
English | ISBN: 0262019914, 0262528371 | 2014 | 256 pages | PDF | 5 MB
UNIX System Security: A Guide for Users and System Administrators (Addison-Wesley Professional Computing

UNIX System Security: A Guide for Users and System Administrators (Addison-Wesley Professional Computing (Paperback)) by Dave Curry
English | Jan. 1, 1992 | ISBN: 0201606402 | 227 Pages | PDF | 3 MB

Because the UNIX system was originally designed by programmers for use by other programmers, it was used in an environment of open cooperation where security was of minimal concern. Now that its use has spread to universities, businesses, and government, the confidential and sensitive nature of the data stored on UNIX systems has made the security of these systems of paramount importance.
Despite all the technical papers and workshops on UNIX security, this book is unique. "UNIX System Security" is the first up-to-date source to provide the UNIX system user or administrator with the information needed to protect the data and system from unauthorized use. By following the procedures described in this book and making use of the C programs and shell scripts provided as examples, you can protect your UNIX system from most attackers.