📄 New blog post: We finished the Chinese release
✕

Anna’s Archive

📚 The largest truly open library in human history. 📈 61,344,044 books, 95,527,824 papers — preserved forever.
AA 38TB
direct uploads
IA 304TB
scraped by AA
DuXiu 298TB
scraped by AA
Hathi 9TB
scraped by AA
Libgen.li 188TB
collab with AA
Z-Lib 77TB
collab with AA
Libgen.rs 82TB
mirrored by AA
Sci-Hub 90TB
mirrored by AA
⭐️ Our code and data are 100% open source. Learn more…
✕ Recent downloads:  
Home Home Home Home
Anna’s Archive
Home
Search
Donate
🧬 SciDB
FAQ
Account
Log in / Register
Account
Public profile
Downloaded files
My donations
Explore
Activity
Codes Explorer
ISBN Visualization ↗
Community Projects ↗
Open data
Datasets
Torrents
LLM data
Stay in touch
Contact email
Anna’s Blog ↗
Reddit ↗
Matrix ↗
Help out
Improve metadata
Volunteering & Bounties
Translate ↗
Development
Anna’s Software ↗
Security
DMCA / copyright claims
Alternatives
annas-archive.li ↗
annas-archive.se ↗
annas-archive.org ↗
SLUM [unaffiliated] ↗
SLUM 2 [unaffiliated] ↗
SearchSearch DonateDonate
AccountAccount
Search settings
Order by
Advanced
Add specific search field
Content
Filetype open our viewer
more…
Access
Source
Language
more…
Display
Search settings
Download Journal articles Digital Lending Metadata
Results 1-50 (250+ total)
lgli/Hadnagy, Christopher - Social Engineering (2010, John Wiley &Sons).pdf
Social Engineering: The Art of Human Hacking by Christopher Hadnagy; [foreword by Paul Wilson] Wiley; John Wiley [distributor], Indianapolis, IN, Indiana, 2011
No matter how sophisticated your security equipment and procedures may be, their most, easily exploitable aspect is, and has always been, the human infrastructure. The skilled malicious social engineer is a weapon, nearly impossible to defend against. This book covers, in detail, the world's first framework for social engineering. It defines, explains, and dissects each principle, then illustrates it with true stories and case studies from masters such as Kevin Mitnick, renowned author of The Art of Deception. You will discover just what it takes to excel as a social engineer. Then you will know your enemy.
Read more…
✅ English [en] · PDF · 6.3MB · 2011 · 📘 Book (non-fiction) · 🚀/lgli/zlib · Save
base score: 14065.0, final score: 169193.86
Social Engineering: The Art of Human Hacking by Christopher Hadnagy; [foreword by Paul Wilson] Wiley; John Wiley [distributor], Indianapolis, IN, Indiana, 2011
No matter how sophisticated your security equipment and procedures may be, their most, easily exploitable aspect is, and has always been, the human infrastructure. The skilled malicious social engineer is a weapon, nearly impossible to defend against. This book covers, in detail, the world's first framework for social engineering. It defines, explains, and dissects each principle, then illustrates it with true stories and case studies from masters such as Kevin Mitnick, renowned author of The Art of Deception. You will discover just what it takes to excel as a social engineer. Then you will know your enemy.
Read more…
✅ English [en] · PDF · 4.3MB · 2011 · 📘 Book (non-fiction) · 🚀/zlib · Save
base score: 14068.0, final score: 169190.84
lgli/U:\!fiction\0day\EBOOKS\en0\Hadnagy, Christopher\Social Engineering_ The Art of Human Hacking\Social Engineering_ The Art of Human Hacking - Christopher Hadnagy.epub
Social Engineering: The Art of Human Hacking by Christopher Hadnagy; [foreword by Paul Wilson] Wiley; John Wiley [distributor], Indianapolis, IN, Indiana, 2011
No matter how sophisticated your security equipment and procedures may be, their most, easily exploitable aspect is, and has always been, the human infrastructure. The skilled malicious social engineer is a weapon, nearly impossible to defend against. This book covers, in detail, the world's first framework for social engineering. It defines, explains, and dissects each principle, then illustrates it with true stories and case studies from masters such as Kevin Mitnick, renowned author of The Art of Deception. You will discover just what it takes to excel as a social engineer. Then you will know your enemy.
Read more…
✅ English [en] · EPUB · 6.3MB · 2011 · 📘 Book (non-fiction) · 🚀/lgli/zlib · Save
base score: 14068.0, final score: 169190.67
lgli/Social Engineering - The Art of Human Hacking - Christopher Hadnagy - 2011.pdf
Social Engineering: The Art of Human Hacking by Christopher Hadnagy; [foreword by Paul Wilson] Wiley; John Wiley [distributor], Indianapolis, IN, Indiana, 2011
No matter how sophisticated your security equipment and procedures may be, their most, easily exploitable aspect is, and has always been, the human infrastructure. The skilled malicious social engineer is a weapon, nearly impossible to defend against. This book covers, in detail, the world's first framework for social engineering. It defines, explains, and dissects each principle, then illustrates it with true stories and case studies from masters such as Kevin Mitnick, renowned author of The Art of Deception. You will discover just what it takes to excel as a social engineer. Then you will know your enemy.
Read more…
✅ English [en] · PDF · 20.5MB · 2011 · 📘 Book (non-fiction) · 🚀/ia/lgli/lgrs · Save
base score: 14068.0, final score: 169190.2
Your ad here.
upload/wll/ENTER/Fict-Bio/Christopher Hadnagy - Social Engineering_ The Art of_ing.epub
Social Engineering: The Art of Human Hacking by Christopher Hadnagy; [foreword by Paul Wilson] Wiley; John Wiley [distributor], Indianapolis, IN, Indiana, 2011
No matter how sophisticated your security equipment and procedures may be, their most, easily exploitable aspect is, and has always been, the human infrastructure. The skilled malicious social engineer is a weapon, nearly impossible to defend against. This book covers, in detail, the world's first framework for social engineering. It defines, explains, and dissects each principle, then illustrates it with true stories and case studies from masters such as Kevin Mitnick, renowned author of The Art of Deception. You will discover just what it takes to excel as a social engineer. Then you will know your enemy.
Read more…
✅ English [en] · EPUB · 6.3MB · 2011 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/upload/zlib · Save
base score: 14065.0, final score: 169190.2
nexusstc/Social Engineering: The Art of Human Hacking/6e76387bbba2cb7396219d67dd20a7c5.epub
Social Engineering: The Art of Human Hacking by Christopher Hadnagy; [foreword by Paul Wilson] Wiley; John Wiley [distributor], Indianapolis, IN, Indiana, 2011
No matter how sophisticated your security equipment and procedures may be, their most, easily exploitable aspect is, and has always been, the human infrastructure. The skilled malicious social engineer is a weapon, nearly impossible to defend against. This book covers, in detail, the world's first framework for social engineering. It defines, explains, and dissects each principle, then illustrates it with true stories and case studies from masters such as Kevin Mitnick, renowned author of The Art of Deception. You will discover just what it takes to excel as a social engineer. Then you will know your enemy.
Read more…
✅ English [en] · EPUB · 6.3MB · 2011 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 14065.0, final score: 169190.2
lgli/Z:\Bibliotik_\4\94.4.25.144\Social Engineering_ The Art of - Christopher Hadnagy_4165.mobi
Social Engineering: The Art of Human Hacking by Christopher Hadnagy; [foreword by Paul Wilson] Wiley; John Wiley [distributor], Indianapolis, IN, Indiana, 2011
No matter how sophisticated your security equipment and procedures may be, their most, easily exploitable aspect is, and has always been, the human infrastructure. The skilled malicious social engineer is a weapon, nearly impossible to defend against. This book covers, in detail, the world's first framework for social engineering. It defines, explains, and dissects each principle, then illustrates it with true stories and case studies from masters such as Kevin Mitnick, renowned author of The Art of Deception. You will discover just what it takes to excel as a social engineer. Then you will know your enemy.
Read more…
✅ English [en] · MOBI · 6.6MB · 2011 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 14055.0, final score: 169190.2
upload/bibliotik/S/Social Engineering - Christopher Hadnagy.epub
Social Engineering: The Art of Human Hacking by Christopher Hadnagy; [foreword by Paul Wilson] Wiley; John Wiley [distributor], Indianapolis, IN, Indiana, 2011
No matter how sophisticated your security equipment and procedures may be, their most, easily exploitable aspect is, and has always been, the human infrastructure. The skilled malicious social engineer is a weapon, nearly impossible to defend against. This book covers, in detail, the world's first framework for social engineering. It defines, explains, and dissects each principle, then illustrates it with true stories and case studies from masters such as Kevin Mitnick, renowned author of The Art of Deception. You will discover just what it takes to excel as a social engineer. Then you will know your enemy.
Read more…
✅ English [en] · EPUB · 6.3MB · 2011 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
base score: 14065.0, final score: 169189.95
upload/bibliotik/S/social_engineering_the_art_of_human_hacking.mobi
Social Engineering: The Art of Human Hacking by Christopher Hadnagy; [foreword by Paul Wilson] Wiley; John Wiley [distributor], Indianapolis, IN, Indiana, 2011
No matter how sophisticated your security equipment and procedures may be, their most, easily exploitable aspect is, and has always been, the human infrastructure. The skilled malicious social engineer is a weapon, nearly impossible to defend against. This book covers, in detail, the world's first framework for social engineering. It defines, explains, and dissects each principle, then illustrates it with true stories and case studies from masters such as Kevin Mitnick, renowned author of The Art of Deception. You will discover just what it takes to excel as a social engineer. Then you will know your enemy.
Read more…
✅ English [en] · MOBI · 10.2MB · 2011 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
base score: 14055.0, final score: 169189.95
Your ad here.
lgli/Z:\Bibliotik_\11\173.165.37.41\%&Ovr0\Social Engineering_ The Art of - Christopher Hadnagy & Paul Wil_16225.mobi
Social Engineering: The Art of Human Hacking by Christopher Hadnagy; [foreword by Paul Wilson] Wiley; John Wiley [distributor], Indianapolis, IN, Indiana, 2011
No matter how sophisticated your security equipment and procedures may be, their most, easily exploitable aspect is, and has always been, the human infrastructure. The skilled malicious social engineer is a weapon, nearly impossible to defend against. This book covers, in detail, the world's first framework for social engineering. It defines, explains, and dissects each principle, then illustrates it with true stories and case studies from masters such as Kevin Mitnick, renowned author of The Art of Deception. You will discover just what it takes to excel as a social engineer. Then you will know your enemy.
Read more…
✅ English [en] · MOBI · 6.6MB · 2011 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 14055.0, final score: 169189.94
upload/duxiu_main/v/zip/extracted__./子乌书简.zip/×ÓÎÚÊé¼ò/Social Engineering.mobi
Social Engineering: The Art of Human Hacking by Christopher Hadnagy; [foreword by Paul Wilson] Wiley; John Wiley [distributor], Indianapolis, IN, Indiana, 2011
No matter how sophisticated your security equipment and procedures may be, their most, easily exploitable aspect is, and has always been, the human infrastructure. The skilled malicious social engineer is a weapon, nearly impossible to defend against. This book covers, in detail, the world's first framework for social engineering. It defines, explains, and dissects each principle, then illustrates it with true stories and case studies from masters such as Kevin Mitnick, renowned author of The Art of Deception. You will discover just what it takes to excel as a social engineer. Then you will know your enemy.
Read more…
✅ English [en] · Chinese [zh] · MOBI · 6.7MB · 2011 · 📘 Book (non-fiction) · 🚀/lgli/upload/zlib · Save
base score: 14058.0, final score: 169189.5
upload/wll/ENTER/Science/IT & AI/Best Ethical Hacking Ebooks Collection/Social Engineering (The Art of Human Hacking).pdf
Social Engineering: The Art of Human Hacking by Christopher Hadnagy; [foreword by Paul Wilson] Wiley; John Wiley [distributor], Indianapolis, IN, Indiana, 2011
No matter how sophisticated your security equipment and procedures may be, their most, easily exploitable aspect is, and has always been, the human infrastructure. The skilled malicious social engineer is a weapon, nearly impossible to defend against. This book covers, in detail, the world's first framework for social engineering. It defines, explains, and dissects each principle, then illustrates it with true stories and case studies from masters such as Kevin Mitnick, renowned author of The Art of Deception. You will discover just what it takes to excel as a social engineer. Then you will know your enemy.
Read more…
✅ English [en] · PDF · 6.4MB · 2011 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
base score: 14065.0, final score: 169189.5
ia/continuousmultiv0000john.pdf
Discrete Distributions N. L. Johnson, Norman L. Johnson, Samuel Kotz John Wiley & Sons Inc, Distributions in Statistics, New York, USA, June 1970
✅ English [en] · PDF · 16.9MB · 1970 · 📗 Book (unknown) · 🚀/ia · Save
base score: 14065.0, final score: 169179.02
ia/continuousmultiv0000john_d1x4.pdf
Continuous Univariate Distributions-1 Norman L. Johnson, Samuel Kotz John Wiley & Sons Inc, Distributions in Statistics, New York, USA, January 1, 1971
The development of extreme value distributions proceeded to some extent outside the mainstream of statistical distribution theory, with its early stage dominated by work on curve fitting and the later stage by problems encountered in statistical inference.
Read more…
✅ English [en] · PDF · 16.3MB · 1971 · 📗 Book (unknown) · 🚀/ia · Save
base score: 14068.0, final score: 169179.0
Your ad here.
nexusstc/Tobias on Locks and Insecurity Engineering/9e4161256fc3a20bac90fe908d85daa8.pdf
Tobias on Locks and Insecurity Engineering: Understanding and Preventing Design Vulnerabilities in Locks, Safes, and Security Hardware Marc Weber Tobias Wiley & Sons, Inc., 1st Edition, Hoboken, New Jersey, 2024
Locks and keys, in various forms, have been employed to protect people, places, information, and assets for the thousands of years. And just as long as there have been locks, there have been people who want to open them without the key or combination. While improvements in lock design, metallurgy, integration of electronics in locks, and other advances should make locks more reliable, the truth is that for a persistent attacker, locks are just as vulnerable as ever and in some cases, even more so. This book examines the multitude of ways that locks are built and designed. More importantly, it then looks at the even greater variety of ways that lock pickers and hackers have found to open locks. Copying a key no longer takes a complex grinder and instead can be done with an easily available 3D printer. If you don't know the digital code to open a lock, what happens to it when you attack it with RF or an EMP generator? And has the designer of the tubular lock your company is spending millions to promote compared the size of the locking mechanism to an off the shelf ball point pen? The book compiles the knowledge Marc Tobias accumulated when he started breaking things at the age of five years. He has since made a career of discovering and exploiting security and related legal vulnerabilities in locks, safes, and security systems. The business of locks is complex and involves liability and compliance issues as well as engineering requirements. This book analyzes different basic lock designs and presents many case examples of often-catastrophic design failures that in some instances resulted in death and property destruction, or compromise of critical information, and millions of dollars in damages. What Does This Book Cover? In the simplest of terms, this book is about what makes a lock or associated hardware “secure” and what can go wrong in the design. In more than one case, the result was the expenditure of millions of dollars on the research and development (R&D) of a high-­security lock that was defeated in a few seconds by an 11-­year-­old kid with virtually no expertise. In my experience consulting for most of the world’s largest lock manufacturers, lock designs fail because of a lack of imagination on the part of everyone involved in the process. This lack of imagination has had significant and costly ramifications in terms of security failures, legal damages, an inability to meet state and federal standards, and a loss of credibility among customers. Ultimately, it puts consumers at risk, and they usually don’t know it. The results are from what I call insecurity engineering, which is the inability to design secure locks because of many factors in the education and training of engineers. That is what this book is about. Electromechanical and electronic locks are slowly changing the landscape in physical security, but they’re subject to even more attacks by “lock pickers” and hackers. Technologies such as 3D printing, radio frequency (RF) and electromagnetic pulse (EMP) generators, electronic and mechanical decoders, and various forms of lock bumping, along with the employment of more sophisticated attack vectors, raise the stakes for manufacturers and end users. These problems pervade the industry and highlight the inability of engineers to think “out of the box” to conceive of possible methods of compromise or failure. "Tobias on Locks and Insecurity Engineering" is written for design engineers, security and IT professionals, risk managers, government services, law enforcement and intelligence agencies, crime labs, criminal investigators, and lawyers. Even for these professionals, there is a lack of understanding of how to evaluate locks in terms of specific security requirements. Relying upon industry standards does little to define what security means and how to defeat it when considering forced entry, covert entry, and key-control issues. The reader will gain an in depth insight into lock designs and technology and how to better assess whether specific solutions will meet security requirements for their needs. The author presents detailed information that can help prevent manufacturers from producing locks that are insecure, and assist risk management personnel in reviewing current or proposed systems. For risk management, criminal investigators and crime laboratories, the information provides a roadmap as to how locks and security systems can be or may have been compromised by criminals or rogue employees.
Read more…
✅ English [en] · PDF · 24.7MB · 2024 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 14065.0, final score: 169178.02
lgli/Christopher Hadnagy - Social Engineering (2010, Wiley Publishing, Inc.).mobi
Social Engineering: The Art of Human Hacking by Christopher Hadnagy; [foreword by Paul Wilson] Wiley; John Wiley [distributor], Indianapolis, IN, Indiana, 2011
No matter how sophisticated your security equipment and procedures may be, their most, easily exploitable aspect is, and has always been, the human infrastructure. The skilled malicious social engineer is a weapon, nearly impossible to defend against. This book covers, in detail, the world's first framework for social engineering. It defines, explains, and dissects each principle, then illustrates it with true stories and case studies from masters such as Kevin Mitnick, renowned author of The Art of Deception. You will discover just what it takes to excel as a social engineer. Then you will know your enemy.
Read more…
✅ English [en] · MOBI · 6.7MB · 2011 · 📘 Book (non-fiction) · 🚀/lgli/zlib · Save
base score: 14058.0, final score: 169176.7
upload/duxiu_main/v/rar/Kindle Computer Science eBook/Social Engineering.mobi
Social Engineering: The Art of Human Hacking by Christopher Hadnagy; [foreword by Paul Wilson] Wiley; John Wiley [distributor], Indianapolis, IN, Indiana, 2011
No matter how sophisticated your security equipment and procedures may be, their most, easily exploitable aspect is, and has always been, the human infrastructure. The skilled malicious social engineer is a weapon, nearly impossible to defend against. This book covers, in detail, the world's first framework for social engineering. It defines, explains, and dissects each principle, then illustrates it with true stories and case studies from masters such as Kevin Mitnick, renowned author of The Art of Deception. You will discover just what it takes to excel as a social engineer. Then you will know your enemy.
Read more…
✅ English [en] · Chinese [zh] · MOBI · 6.7MB · 2011 · 📘 Book (non-fiction) · 🚀/lgli/upload/zlib · Save
base score: 14055.0, final score: 169176.42
upload/duxiu_main/x/rar/718本书/英文-86/Social Engineering - Christopher Hadnagy.mobi
Social Engineering: The Art of Human Hacking by Christopher Hadnagy; [foreword by Paul Wilson] Wiley; John Wiley [distributor], Indianapolis, IN, Indiana, 2011
No matter how sophisticated your security equipment and procedures may be, their most, easily exploitable aspect is, and has always been, the human infrastructure. The skilled malicious social engineer is a weapon, nearly impossible to defend against. This book covers, in detail, the world's first framework for social engineering. It defines, explains, and dissects each principle, then illustrates it with true stories and case studies from masters such as Kevin Mitnick, renowned author of The Art of Deception. You will discover just what it takes to excel as a social engineer. Then you will know your enemy.
Read more…
✅ English [en] · Chinese [zh] · MOBI · 2.9MB · 2011 · 📕 Book (fiction) · 🚀/lgli/upload/zlib · Save
base score: 14055.0, final score: 169176.27
lgli/Z:\Bibliotik_\A Library\Social Engineering - Christopher Hadnagy_3539.pdf
Social Engineering: The Art of Human Hacking by Christopher Hadnagy; [foreword by Paul Wilson] Wiley; John Wiley [distributor], Indianapolis, IN, Indiana, 2011
No matter how sophisticated your security equipment and procedures may be, their most, easily exploitable aspect is, and has always been, the human infrastructure. The skilled malicious social engineer is a weapon, nearly impossible to defend against. This book covers, in detail, the world's first framework for social engineering. It defines, explains, and dissects each principle, then illustrates it with true stories and case studies from masters such as Kevin Mitnick, renowned author of The Art of Deception. You will discover just what it takes to excel as a social engineer. Then you will know your enemy.
Read more…
✅ English [en] · PDF · 6.3MB · 2011 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 14065.0, final score: 169176.27
Your ad here.
lgli/Z:\Bibliotik_\5\94.8.120.54\Social Engineering_ The Art of - Christopher Hadnagy_2704.mobi
Social Engineering: The Art of Human Hacking by Christopher Hadnagy; [foreword by Paul Wilson] Wiley; John Wiley [distributor], Indianapolis, IN, Indiana, 2011
No matter how sophisticated your security equipment and procedures may be, their most, easily exploitable aspect is, and has always been, the human infrastructure. The skilled malicious social engineer is a weapon, nearly impossible to defend against. This book covers, in detail, the world's first framework for social engineering. It defines, explains, and dissects each principle, then illustrates it with true stories and case studies from masters such as Kevin Mitnick, renowned author of The Art of Deception. You will discover just what it takes to excel as a social engineer. Then you will know your enemy.
Read more…
✅ English [en] · MOBI · 6.6MB · 2011 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 14055.0, final score: 169176.27
upload/duxiu_main/v/rar/55/Christopher Hadnagy/Social Engineering_ The Art of Human Hacking (9006)/Social Engineering_ The Art of Human Hacking - Christopher Hadnagy.mobi
Social Engineering: The Art of Human Hacking by Christopher Hadnagy; [foreword by Paul Wilson] Wiley; John Wiley [distributor], Indianapolis, IN, Indiana, 2011
No matter how sophisticated your security equipment and procedures may be, their most, easily exploitable aspect is, and has always been, the human infrastructure. The skilled malicious social engineer is a weapon, nearly impossible to defend against. This book covers, in detail, the world's first framework for social engineering. It defines, explains, and dissects each principle, then illustrates it with true stories and case studies from masters such as Kevin Mitnick, renowned author of The Art of Deception. You will discover just what it takes to excel as a social engineer. Then you will know your enemy.
Read more…
✅ English [en] · MOBI · 6.6MB · 2011 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/upload/zlib · Save
base score: 14055.0, final score: 169176.23
lgli/N:\!genesis_\0day\!non_fiction\Social Engineering.epub
Social Engineering: The Art of Human Hacking by Christopher Hadnagy; [foreword by Paul Wilson] Wiley; John Wiley [distributor], Indianapolis, IN, Indiana, 2011
No matter how sophisticated your security equipment and procedures may be, their most, easily exploitable aspect is, and has always been, the human infrastructure. The skilled malicious social engineer is a weapon, nearly impossible to defend against. This book covers, in detail, the world's first framework for social engineering. It defines, explains, and dissects each principle, then illustrates it with true stories and case studies from masters such as Kevin Mitnick, renowned author of The Art of Deception. You will discover just what it takes to excel as a social engineer. Then you will know your enemy.
Read more…
✅ English [en] · EPUB · 6.3MB · 2011 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 14065.0, final score: 169176.23
lgli/Z:\Bibliotik_\1\80.4.223.22\Social Engineering_ The Art of - Christopher Hadnagy_11549.mobi
Social Engineering: The Art of Human Hacking by Christopher Hadnagy; [foreword by Paul Wilson] Wiley; John Wiley [distributor], Indianapolis, IN, Indiana, 2011
No matter how sophisticated your security equipment and procedures may be, their most, easily exploitable aspect is, and has always been, the human infrastructure. The skilled malicious social engineer is a weapon, nearly impossible to defend against. This book covers, in detail, the world's first framework for social engineering. It defines, explains, and dissects each principle, then illustrates it with true stories and case studies from masters such as Kevin Mitnick, renowned author of The Art of Deception. You will discover just what it takes to excel as a social engineer. Then you will know your enemy.
Read more…
✅ English [en] · MOBI · 6.6MB · 2011 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 14055.0, final score: 169176.23
nexusstc/Tracy Brian The Power of Self-Confidence Become Unstoppable Irresistible and Unafraid in Every Area of Your Life John Wiley & Sons, Ltd 2012/be6fff338f5975210995fa55db5bbf86.pdf
Tracy Brian The Power of Self-Confidence Become Unstoppable Irresistible and Unafraid in Every Area of Your Life John Wiley & Sons, Ltd 2012 Tracy Brian John Wiley & Sons, 2012
Contents Title Copyright Dedication Introduction Chapter 1: The Foundation of Self-Confidence You Become What You Think About Personal Growth is Not Easy Your Inner Life Predicts Your Outer Life Start with Your Inner Life Determine Your Values Values in Business Clarify Your Personal Values Values are Nonnegotiable Values Clarification Organize Your Values Order of Values Forces You to Choose Integrity Revisited Set Peace of Mind as Your Highest Principle Your Values are Only Expressed in Your Actions The Law of Reversibility The Act-As-If Principle The Principle of Resistance Developing Inner Strength Chapter 2: Purpose and Personal Power The Law of Indirect Effort Become More Confident and Competent Thought is Creative The Law of Attraction The Law of Correspondence The Law of Concentration The Law of Substitution The Law of Emotion The Power of Decision The Importance of Goals The Master Skill of Success Remarkable Success Stories Fear Holds You Back The Comfort Zone Resistance to Change The Attainment of Personal Greatness Imagine No Limitations Categorize Your Goals Organize Your Goals Focus and Concentrate Make It Measurable and Bound by Time Make Your Plans A Simple Technique Chapter 3: Achieving Competence and Personal Mastery The Edge of the Envelope Expand Your Envelope Self-Confidence and Self-Esteem Build Your Own Self-Confidence Achieving Peak Performance Getting Into the Flow Experience Find Your True Place Grandma Moses Follow Your Heart Courage and Confidence are Essential The Four Quadrants of Work Examine Your Work History Design Your Ideal Work Life Maximize Your Return on Energy Do What You Love Two Questions to Test Job Suitability Commit to Excellence Excellence is Learnable The Law of Accumulation The Law of Incremental Improvement Pattern Recognition The Grand Masters The Foundation of Self-Confidence Moving to the Top Identify Your Key Skills Analyze Your Skill Levels Deliberate Practice Identify Your Key Skill All Skills are Learnable Your Most Valuable Financial Asset Chapter 4: The Inner Game of Self-Confidence The Law of Belief The Power of Belief The $500,000 Check The Man on the Bridge First Convince Yourself The Power of Suggestion Control Your Suggestive Environment Control Your Emotions Think Before You React The Power of Self-Suggestion Make Self-Control into a Game The Power of Autosuggestion A Quick Review Take Charge of Your Life Actions Have Consequences Problems versus Facts Accepting Responsibility is the Beginning Control Your Thoughts Positive Self-Talk Your Interpretive Style Practice Positive Expectations Talk to Yourself Positively Control Your Thoughts and Feelings Unlimited Potential Written Affirmations Practice Visualization Mental Rehearsal Improve Your Mental Pictures Get Your Dream House The End of the Movie Feed Your Mind Get Around Positive People Attract Positive People into Your Life Everything Counts Take Action Continually Chapter 5: Capitalizing on Your Strengths Your Area of Excellence Choose the Right Field Happiness and Satisfaction Living Congruently Courage is Essential Follow Your Heart Be Honest with Yourself Compensating for Weaknesses Developing Strength and Resiliency You are a Bundle of Resources Assess Your Strengths and Weaknesses Increase Your Return on Energy Differentiate Yourself You are the President of You, Inc. Join the Top 3 Percent Designing Your Future Find Out What You are Meant to Do Be Prepared to Develop New Skills Be Aware of Yourself Invest in Yourself Self-Analysis and Self-Disclosure List All Your Current Skills and Capabilities Cluster Your Roles and Activities Set Priorities on Your Roles Ask for Input from Others An Important Insight Determine What Motivates You Make a Real Difference Accept Your Weaknesses Sales versus Management Situational Weaknesses You May Be Hypersensitive Amenable to Education Weaknesses are Good Indicators Strengths and Weaknesses Chapter 6: Triumphing over Adversity Persistence is Essential The Reality Habit The Test of Character Play Well on the Team Crisis Management Reversals of Fortune The Challenge-Response Theory Deal with the Challenge Effectively All Civilizations Eventually Decline The Story of Your Life The Rise and Fall of a Business Your Responses Determine Your Future Problems and Difficulties Come Unbidden Adversity and Character Development Your Response-Ability is the Key Responding Well to Disappointment Crisis Anticipation Advance Thinking and Planning The Concept of Failure Double Your Rate of Failure Our Greatest Inventor Success is a Numbers Game Learn from Every Failure Plan for the Future Spread the Risk What Could Go Wrong? Become Intensely Solution Oriented Never Consider the Possibility of Failure Courage and Persistence Chapter 7: Self-Confidence In Action Self-Confidence is Critical Try More Things An Inauspicious Beginning Early Behavior Problems Failure from the Beginning Laboring Jobs Selling from Door to Door The Big Question The Big Turning Point The Importance of Goals Three Great Ideas We Sabotage Ourselves You Can Develop Any Quality The Secret of Success The Four Ds of Success and Self-Confidence Positive Knowing versus Positive Thinking The Gallup Success Survey Five Essential Success Qualities Be Good at What You Do Self-Reliance Intelligence is More Than IQ Income and IQ How is Intelligence Defined? Intelligence Defined Make Your Actions Congruent Avoid Self-Delusion Getting the Job Done Get Onto the Fast Track Do What the Top People Do Plan Your Work and Work Your Plan Do Your Work Quickly and Well Dedicate Yourself to Continuous Learning Take Continuous Forward Action Be Your Own Cheerleader Control Your Mental Pictures Develop Discipline and Courage Take Excellent Care of Yourself Speak Up with Confidence and Clarity Practice No-Limit Thinking About the Author Brian Tracy: Speaker-Author-Consultant Index
Read more…
English [en] · PDF · 1.3MB · 2012 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 167480.66
Your ad here.
lgli/Publisher : John Wiley and Sons - A Little Bit of Everything For Dummies (2011, ).mobi
A Little Bit of Everything For Dummies Publisher : John Wiley and Sons John Wiley and Sons, 1, 2011
Twenty years ago the very first For Dummies book, DOS For Dummies, was published. From that first printing of that first book came a series unlike anything in the publishing world, one that is global in both geography - we have been published worldwide in some 30 languages - and in coverage. No single volume can hope to summarize what thousands of titles have meant to millions of readers over the years, and we don't claim to do that in this e-book. Rather, this e-book celebrates the breadth and depth of the For Dummies series, offering 20 chapters - in honor of our 20 years - from a list of books compiled by our global colleagues. We are confident the chapters we've included give you a representative glimpse at why - no matter what the topic - our products have meant so much to so many by Making Everything Easier. We've grouped our chapters into five main parts: Part I: Dummies Classics, offers four chapters from some of our best-loved books. There's a chapter from DOS For Dummies, the book that started it all, and chapters from two of our best-sellers: Windows 7 For Dummies and Sex For Dummies. And just for a bit of spice, we've included a chapter from French For Dummies. Part II: Daily Dose of Dummies, offers the kind of lifestyle, self-help, and business skills that our readers have come to treasure. There's one of our famous Part of Tens chapters from Cognititive Behavioural Therapy for Dummies and a chapter from Meditation For Dummies to help you get your center. Chapters from Leadership For Dummies and Marketing For Dummies help you develop new skills for the marketplace. Part III, Fun with Dummies, celebrates life and all it has to offer. We've got chapters here from The Royal Wedding For Dummies, Guitar For Dummies, Digital Photography SLR All-in-One For Dummies, Puppies for Dummies, Knitting For Dummies, and Wine For Dummies. Part IV, Get Social, highlights how we help you grow and develop new skills. Chapters here come from Facebook For Dummies, Social Media Marketing For Dummies, and Dating For Dummies. Part V, Going Global, shares the worldwide appeal of the For Dummies series. These chapters from British History For Dummies, Canadian History For Dummies, and Rugby Union For Dummies were created by our global colleagues and authors and show how the For Dummies approach applies not only to whatever the subject is at hand, but also wherever the discussion is taking place. Download and enjoy!
Read more…
English [en] · MOBI · 9.7MB · 2011 · 📘 Book (non-fiction) · 🚀/lgli/zlib · Save
base score: 11058.0, final score: 167480.25
nexusstc/Unmanned aircraft systems. UAVS design, development and deployment/c6d976dc92dc711c820a75e36f6d3145.pdf
Unmanned aircraft systems. UAVS design, development and deployment Reg Austin John Wiley & Sons, 2010
Издание: John Wiley & Sons Unmanned Aircraft Systems delivers a much needed introduction to UAV System technology, taking an integrated approach that avoids compartmentalising the subject. Arranged in four sections, parts 1-3 examine the way in which various engineering disciplines affect the design, development and deployment of UAS. The fourth section assesses the future challenges and opportunities of UAS. Technological innovation and increasingly diverse applications are two key drivers of the rapid expansion of UAS technology. The global defence budget for UAS procurement is expanding, and in the future the market for civilian UAVs is expected to outmatch that of the military. Agriculture, meteorology, conservation and border control are just a few of the diverse areas in which UAVs are making a significant impact the author addresses all of these applications, looking at the roles and technology behind both fixed wing and rotorcraft UAVs. Leading aeronautical consultant Reg Austin co-founded the Bristol International Remotely Piloted Vehicle (RPV) conferences in 1979, which are now the longest-established UAS conferences worldwide. In addition, Austin has over 40 years experience in the design and development of UAS. One of Austins programmes, the «Sprite UAV System» has been deployed around the world and operated by day and night, in all weathers.
Read more…
English [en] · PDF · 5.1MB · 2010 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 167480.25
nexusstc/Knitting Patterns For Dummies/3fd2a7443eb2cbae9585bd23db3d6745.pdf
Knitting Patterns For Dummies Kristi Porter John Wiley & Sons, For Dummies, 2007
Данная книга - это простые инструкции и простые в использовании шаблоны для вязания, которые помогут вам создать широкий ассортимент классических, красивых трикотажных изделий для всей семьи, от одежды и предметов домашнего обихода до идей подарков. Это удобное пособие дает вам множество новых способов отдыхать с помощью игл и пряжи с такими замечательными проектами, как базовые пончо и пуловеры, войлочные сумки и тапочки, свитера, а также аксессуары для дома и ребенка. Вы получаете пошаговые инструкции для всех шаблонов в книге, а также линейные чертежи и 8 страниц полноцветных фотографий, которые помогут вам. И с вариациями, добавленными в конце многих шаблонов, у вас будет почти 100 проектов на выбор! Knitting Patterns For Dummies is chock–full of simple instructions and easy–to–follow patterns to help you create a wide range of classic, beautiful knits for the whole family, from clothing to household items to gift ideas. This fun, friendly guide gives you scores of new ways to have fun with needles and yarn, with great projects such as basic ponchos and pullovers, felted bags and slippers, cabled sweaters, and home and baby accessories, to name a few. You get step–by–step instructions for all the patterns in the book, along with line drawings and 8 pages of full–color photos to guide you. And, with the variations added at the end of many of the patterns, you ll have almost 100 projects to choose from!
Read more…
English [en] · PDF · 11.1MB · 2007 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 167480.23
nexusstc/Introductory Circuit Theory/c818bf769b2777395ce3f4fb897388e0.djvu
Introductory Circuit Theory Ernst A. Guillemin John Wiley and Sons, 1st edition, 1953
This was the classic introduction to linear passive circuit theory used at the sophomore level at MIT for many years. I am unaware of any other book that lays out the fundamental ideas with the clarity of this work. Mastery of these fundamentals (scaling, topological transformations, etc.) can make circuit analysis enormously easier and is an excellent preparation for learning synthesis of active and passive circuits.
Read more…
English [en] · DJVU · 12.4MB · 1953 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc · Save
base score: 11055.0, final score: 167480.22
nexusstc/JavaFX For Dummies/6edc63a91ad6967b50222add23f66643.djvu
JavaFX For Dummies Doug Lowe John Wiley, For Dummies, 2014
English [en] · DJVU · 5.5MB · 2014 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11052.0, final score: 167480.17
Your ad here.
lgli/P:\!!!!\Economics\John Wiley & Sons - Economics Of Conflict - Private Sector Activity In Armed Conflict.pdf
Economics Of Conflict - Private Sector Activity In Armed Conflict John Wiley & Sons
English [en] · PDF · 0.8MB · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11053.0, final score: 167480.16
nexusstc/Introduction to Antenna Placement and Installation/241d89c7d959b670cf0aba60afb5cf5c.pdf
Introduction to Antenna Placement and Installation Thereza Macnamara John Wiley & Sons, 2010
Издание: John Wiley & Sons Introduction to Antenna Placement and Installation introduces the characteristics of antennas and their integration on aircraft. The book covers antenna siting and placement, computational antenna modelling on structures, measurement on sub-scale models of the airframe, full-scale ground measurements and in-flight measurements. The author addresses the different stages in the process of developing an entire antenna layout, as well as covering individual retrofits on existing platforms. She explains the physics of antenna placement qualitatively, thus obviating the requirement to understand complex mathematical equations. Provides a reference book & guide written primarily for Antenna and Integration Engineers but which will also be of interest to Systems Engineers and Project Managers Includes chapters on aircraft systems using antennas, restrictions & trade-offs, frequency & spatial coverage considerations, effect of other antennas & obstacles, RF interoperability issues associated with radiated emissions, computer modelling software, scaled model & full-scale measurements, comparison between measurements & modelling, as well as ground tests and in-flight measurements Describes techniques that can be applied equally to antennas on other structures such as land or sea vehicles and spacecraft Illustrated throughout with figures & diagrams as well as a full colour plates
Read more…
English [en] · PDF · 9.4MB · 2010 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 167480.16
nexusstc/Holographic Imaging/694bea7c162fdd7e9b1906ba6b881306.djvu
Holographic Imaging Stephen A. Benton, V.Michael Bove Jr. A John Wiley Sons, Inc., 2007
Talks aboutthe three-dimensional imaging technique of holography. This book covers the fundamental physical and optical principles of using diffraction to record and reconstruct images, human perception, and the history of holographic imaging with an explanation of both basic and advanced holographic concepts.This is a book about the three-dimensional imaging technique of holography. It covers the fundamental physical and optical principles of using diffraction to record and reconstruct images, human perception, and the history of holographic imaging with an approachable explanation of both basic and advanced holographic concepts. This authoritative work focuses on practical holography, including methods for white light illumination, full color holography, and holographic recording of natural scenes. The book promotes a hands-on approach to making holograms and an understanding of why and how they work. While several existing texts cover different aspects of the field of holography, none provides a complete, up-to-date, and accessible view of its popular, scientific, and engineering aspects. Hobbyist manuals such as Homemade Holography (Unterseher, Hansen and Schlesinger, Ross Books 1982) and survey works such as Practical Holography (Saxby, Prentice Hall London, 1994) are approachable but focus on the art and craft of holography at the expense of important and instructive foundation concepts. Mature engineering texts such as Optical Holography (Collier, Burckhardt, and Lin, Academic Press 1971) and Handbook of Optical Holography (Caulfield, Academic Press 1979) are strongly math-oriented and lie beyond the reach of many students, laypeople and even engineers from other disciplines. Optical Holography: Principles, Techniques, and Applications (Hariharan, Cambridge University Press 1996) is more accessible but still assumes an optics background. Holographic Imaging bridges these worlds in a single text that conveys a reader from physical first principles to the cutting edge of development of the worlds most advanced three dimensional/interactive displays.
Read more…
English [en] · DJVU · 80.1MB · 2007 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11055.0, final score: 167480.16
nexusstc/Advanced control of aircraft, spacecraft and rockets/296b1eb72382376c56400250f2544369.pdf
Advanced control of aircraft, spacecraft and rockets Ashish Tewari John Wiley & Sons, 2011
Издание: John Wiley & Sons Advanced Control of Aircraft, Spacecraft and Rockets introduces the reader to the concepts of modern control theory applied to the design and analysis of general flight control systems in a concise and mathematically rigorous style. It presents a comprehensive treatment of both atmospheric and space flight control systems including aircraft, rockets (missiles and launch vehicles), entry vehicles and spacecraft (both orbital and attitude control). The broad coverage of topics emphasizes the synergies among the various flight control systems and attempts to show their evolution from the same set of physical principles as well as their design and analysis by similar mathematical tools. In addition, this book presents state-of-art control system design methods - including multivariable, optimal, robust, digital and nonlinear strategies - as applied to modern flight control systems. Advanced Control of Aircraft, Spacecraft and Rockets features worked examples and problems at the end of each chapter as well as a number of MATLAB / Simulink examples housed on an accompanying website at http://home.iitk.ac.in/~ashtew that are realistic and representative of the state-of-the-art in flight control.
Read more…
English [en] · PDF · 5.0MB · 2011 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 167480.16
nexusstc/Aircraft Fuel Systems/b50ad75ac9908bc5acdd5b221bfce0fe.pdf
Aircraft Fuel Systems Roy Langton, Chuck Clark, Martin Hewitt, Lonnie Richards John Wiley & Sons, 2009
Издание: John Wiley & Sons The fuel systems on board modern aircraft are multi-functional, fully integrated complex networks. They are designed to provide a proper and reliable management of fuel resources throughout all phases of operation, notwithstanding changes in altitude or speed, as well as to monitor system functionality and advise the flight crew of any operational anomalies that may develop. Collates together a wealth of information on fuel system design that is currently disseminated throughout the literature. Authored by leading industry experts from Airbus and Parker Aerospace. Includes chapters on basic system functions, features and functions unique to military aircraft, fuel handling, fuel quantity gauging and management, fuel systems safety and fuel systems design and development. Accompanied by a companion website housing a MATLAB/SIMULINK model of a modern aircraft fuel system that allows the user to set up flight conditions, investigate the effects of equipment failures and virtually fly preset missions. Aircraft Fuel Systems provides a timely and invaluable resource for engineers, project and programme managers in the equipment supply and application communities, as well as for graduate and postgraduate students of mechanical and aerospace engineering. It constitutes an invaluable addition to the established Wiley Aerospace Series.
Read more…
English [en] · PDF · 7.6MB · 2009 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 167480.16
Your ad here.
nexusstc/Traveling Waves on Transmission Systems/530e693683ee1797bcba727700de125f.pdf
Traveling Waves on Transmission Systems L. V. Bewley John Wiley & Sons, 1933
English [en] · PDF · 20.1MB · 1933 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11062.0, final score: 167480.14
nexusstc/Aircraft Aerodynamic. Design Geometry and Optimization/0a5b8ed4e96bfaf7c2bcd43277714a2d.pdf
Aircraft Aerodynamic. Design Geometry and Optimization Andras Sobester, Alexander I J Forrester John Wiley & Sons, 2014
Издание: John Wiley & Sons Optimal aircraft design is impossible without a parametric representation of the geometry of the airframe. We need a mathematical model equipped with a set of controls, or design variables, which generates different candidate airframe shapes in response to changes in the values of these variables. This models objectives are to be flexible and concise, and capable of yielding a wide range of shapes with a minimum number of design variables. Moreover, the process of converting these variables into aircraft geometries must be robust. Alas, flexibility, conciseness and robustness can seldom be achieved simultaneously. Aircraft Aerodynamic Design: Geometry and Optimization addresses this problem by navigating the subtle trade-offs between the competing objectives of geometry parameterization. It beginswith the fundamentals of geometry-centred aircraft design, followed by a review of the building blocks of computational geometries, the curve and surface formulations at the heart of aircraft geometry. The authors then cover a range of legacy formulations in the build-up towards a discussion of the most flexible shape models used in aerodynamic design (with a focus on lift generating surfaces). The book takes a practical approach and includes MATLAB®, Python and Rhinoceros® code, as well as ‘real-life’ example case studies.
Read more…
English [en] · PDF · 8.6MB · 2014 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 167480.14
nexusstc/Complementary Medicine For Dummies/7e1b33d9277f4d80c1e4449e0cb7e338.pdf
Complementary Medicine For Dummies Jacqueline Young John Wiley & Sons, Ltd, 2007
This book is for all those people who are willing to have an open yet discerning mind about complementary medicine. It is also dedicated, with thanks, to all my complementary medicine teachers, patients, students, and colleagues. Yes, we need to explore and research complementary therapies so that we can be confident about their safety and effectiveness. Yet at the same time we should not allow barriers to be erected that may obstruct new learning and deny access to therapies that could provide a powerful healing force in our world.
Read more…
English [en] · PDF · 4.5MB · 2007 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 167480.14
nexusstc/Evolution of the Vertebrates/b1cd922162cd095f74488207e5c95400.pdf
Evolution of the Vertebrates Edwin H. Colbert John Wiley & Sons, 1966
English [en] · PDF · 50.3MB · 1966 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11062.0, final score: 167480.14
ia/microsoftsqlserv0000micr.pdf
Exam 70-431 Microsoft SQL Server 2005 Implementation and Maintenance Lab Manual (Microsoft Official Academic Course Series) MOAC (Microsoft Official Academic Course); Joseph L. Jordan Chichester: John Wiley & Sons Ltd: [distributor] John Wiley and Sons Ltd: [distributor] John Wiley & Sons Australia Ltd: [distributor] John Wiley & Sons Australia Ltd: [distributor] John Wiley & Sons Cape Town: [distributor] John Wiley & Sons, Place of publication not identified, 2008
Exam 70-431, SQL Server 2005 Implementation and Maintenance. The Microsoft Official Academic Course (MOAC) courses mapping to the Microsoft Certified Technology Specialist (MCTS) 70-431 certification exam. The MOAC IT Professional series is the Official from Microsoft, turn-key Workforce training program that leads to professional certification and was authored for college instructors and college students. MOAC gets instructors ready to teach and students ready for work by delivering essential resources in 5 key areas: Instructor readiness, student software, student assessment, instruction resources, and learning validation. With the Microsoft Official Academic course program, you are getting instructional support from Microsoft; materials that are accurate and make course delivery easy. Request your sample materials today.
Read more…
English [en] · PDF · 15.8MB · 2008 · 📗 Book (unknown) · 🚀/ia · Save
base score: 11068.0, final score: 167480.14
Your ad here.
nexusstc/Excel 2013 Simplified/6474c0a217a6355eea947817ada716f5.pdf
Excel 2013 Simplified Paul McFedries John Wiley & Sons, 2013
As the worlds leading spreadsheet program, Excel is a spreadsheet and data analysis tool that is part of the Microsoft Office suite. The new Excel 2013 includes new features and functionalities that require users of older versions to re-learn the application. However, whether youre switching from an earlier version or learning Excel for the first time, this easy-to-follow visual guide gets you going with Excel 2013 quickly and easily. Numbered steps as well as full-color screen shots, concise information, and helpful tips, all contribute to a clear, comfortable learning experience. - Covers Excel basics, workbook fundamentals, formatting worksheets and enhancing them with graphics, analyzing data, communicating results with charts and PivotTables, and much more - Walks you through using Flash Fill, representing your data in a variety of ways, and maximizing a more interactive interface - Demonstrates how to share workbooks, collaborate with others, and embed portions of your spreadsheets on social network pages Excel 2013 Simplified is a quick and easy way to get up to speed on Excel 2013 for both novice users and those upgrading from an earlier version.
Read more…
English [en] · PDF · 31.9MB · 2013 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 167480.1
nexusstc/Jewelry Making and Beading For Dummies/031c8f8b3e86db80a6775cefb4ddc3c3.pdf
Jewelry Making and Beading For Dummies Heather H. Dismore John Wiley & Sons, Inc., 2013
Make bracelets, necklaces, earrings, rings, pins, key chains, and more. Want to make jewelry and gifts from scratch? This new edition of Jewelry Making & Beading For Dummies provides the easy-to-understand information that makes it easy. Updated information on getting started and setting up the necessities of a jewelry makers workshop. New innovative ideas for materials such as making beads from scratch, customizing components like glass pendants, and up-cycling found objects for new creations. Updated trends including Victorian, Steampunk, Indian-inspired, and wrap bracelets. Advice on how to gain project ideas through websites like Pinterest without infringing on someones rights. New and updated information on setting up a storefront, turning your hobby into a business, and gaining exposure through Etsy.com, blogs, and social media sites. With hundreds of detailed photos—now featured in full-color—Jewelry Making & Beading For Dummies is the ideal resource youll turn to again and again to create one-of-a-kind jewelry pieces and assorted gifts.
Read more…
English [en] · PDF · 23.2MB · 2013 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 167480.08
nexusstc/Microsoft Access 2013 For Dummies/d8cb96577147575180cd6ddbdf4d1e33.pdf
Microsoft Access 2013 For Dummies Fuller L.U., Cook K. John Wiley & Sons, For Dummies, 2013
Microsoft Access allows you to store, organize, view, analyze, and share data the new Access 2013 release enables you to build even more powerful, custom database solutions that integrate with the web and enterprise data sources. Access 2013 For Dummies covers all the new features of the latest version of Accessand serves as an ideal reference, combining the latest Access features with the basics of building usable databases. You’ll learn how to create an app from the Welcome screen, get support for your desktop databases, and much more. Includes coverage of all the new features of Access 2013, including the updated interface Shows you how to create and share reports Features special videos and materials created by the authors to help reinforce the lessons included in the book Helps you build data analysis and interface tools for your specific needs Offers plenty of techniques and tips for solving common problems Access 2013 For Dummies provides you with access to the latest version of this database tool. Learn to: Navigate the Access interface and understand database architecture Build tables to organize data and create forms for easy data entry Query your data and produce reports Build custom interfaces for all users
Read more…
English [en] · PDF · 43.2MB · 2013 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 167480.08
nexusstc/Introduction to Geometry/6350eb8fbe626903e577fccbe06c8a18.pdf
Introduction to Geometry H. S. M. Coxeter John Wiley & Sons, Wiley Classics Library, 2, 1969
English [en] · PDF · 17.2MB · 1969 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11062.0, final score: 167480.08
lgli/E:\!!!chem\electron_ionization_time-of-flight_mass_spectrometry-_historical_review_and_current_applications.pdf
electron ionization time-of-flight mass spectrometry- historical review and current applications Nasrin Mirsaleh-Kohan, Wesley D.Robertson, and Robert N.Compton John Wiley and Sons; Wiley (John Wiley & Sons); John Wiley & Sons Inc.; Wiley (ISSN 0277-7037), Mass Spectrometry Reviews, #3, 27, pages 237-285, 2008 may
## Abstract This review presents an overview of electron ionization time‐of‐flight mass spectroscopy (EITOFMS), beginning with its early development to the employment of modern high‐resolution electron ionization sources. The EITOFMS is demonstrated to be ideally suited for analytical and basic chemical physics studies. Studies of the formation of positive ions by electron ionization time‐of‐flight mass spectroscopy have been responsible for many of the known ionization potentials of molecules and radicals, as well as accepted bond dissociation energies for ions and neutral molecules. The application of TOFMS has been particularly important in the area of negative ion physics and chemistry. A wide variety of negative ion properties have been discovered and studied by using these methods including: autodetachment lifetimes, metastable dissociation, Rydberg electron transfer reactions and field detachment, SF~6~ Scavenger method for detecting temporary negative ion states, and many others. © 2008 Wiley Periodicals, Inc. Mass Spec Rev 27: 237–285, 2008
Read more…
English [en] · PDF · 0.8MB · 2008 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/scihub/zlib · Save
base score: 11060.0, final score: 167480.03
Your ad here.
nexusstc/ZBrush Creature Design – Creating Dynamic Concept Imagery for Film and Games/08af2f920a4d13cd465946858080edf0.pdf
ZBrush Creature Design – Creating Dynamic Concept Imagery for Film and Games Scott Spencer John Wiley & Sons Inc, 2012
ZBrush allows you to develop a creature for film and games in realistic, 3D format. With this book, you will learn how to create a unique creature from start to finish and search for and repair any foreseeable problems. Clear instructions guide you through using Photoshop in combination with ZBrush to finely render a creature so you can see how it will appear on screen. Experienced ZBrush author and designer Scott Spencer shows you how to start with your concept in ZBrush as a preliminary digital model and then further refine it in Photoshop in order to fabricate a hyperrealistic image. Guides you through artistic concepts to visualize your creature Walks you through the process of conceptualizing a creature in ZBrush Details techniques for using Photoshop to refine your design Encourages you to use ZBrush as a sculpting and designing tool and then use Photoshop as a painting and finishing tool
Read more…
English [en] · PDF · 40.8MB · 2012 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 167480.02
nexusstc/Scream of Eagles The Creation of Top Gun and the U.S. Air Victory in Vietnam/55647e721f3f87d406942717ecf273f8.pdf
Scream of Eagles The Creation of Top Gun and the U.S. Air Victory in Vietnam Robert K. Wilcox John Wiley & Sons, Inc., 1990
English [en] · PDF · 32.3MB · 1990 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11062.0, final score: 167480.02
nexusstc/incident response computer forensics toolkit/942ff771eb7f359f4d3d0e3b033a3376.zip
incident response computer forensics toolkit Wiley sons
English [en] · ZIP · 5.3MB · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11043.0, final score: 167479.98
nexusstc/IBM Software for System z For Dummies/961a4a0a3b91684c138dd737ed1aacb3.pdf
IBM Software for System z For Dummies Lawrence Miller John Wiley & Sons, Incorporated, For Dummies, 2013
IBM Software for System z For Dummies, Limited Edition, explores how you can get the maximum value out of your data to make real-time decisions. IBM System z plays a pivotal role in building a Smarter Planet, which is IBMs vision for a more instrumented, interconnected, and intelligent world. With enterprise systems and software cloud technologies, you can increase your business value and rapidly scale cloud environments with excellent time-to-market, integration, and management.
Read more…
English [en] · PDF · 21.3MB · 2013 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 167479.94
lgli/Derek Matravers - Empathy (John Wiley & Sons, Inc.).rtf
Empathy Derek Matravers John Wiley & Sons, Inc.
English [en] · RTF · 0.9MB · 📘 Book (non-fiction) · 🚀/lgli/zlib · Save
base score: 11040.0, final score: 167479.94
Your ad here.
nexusstc/Architectural Design with SketchUp Component-Based Modeling, Plugins, Rendering, and Scripting/d9e69575d183784e3e76229960265ccf.pdf
Architectural Design with SketchUp Component-Based Modeling, Plugins, Rendering, and Scripting Alexander C. Schreyer John Wiley & Sons, Inc., 2012
ow to get spectacular results with the 3D-modeling app SketchUp? While it is easy to pick up the basic techniques of SketchUp, going beyond these essentials requires step-by-step instruction and practice. Architectural Design with SketchUp provides the knowledge needed to move past the basics and take full advantage of SketchUp as a powerful 3D modeling tool. After a SketchUp refresher, this user-friendly handbook covers component-based modeling for assembly, scheduling, collaborative design, and modeling with a BIM approach.
Read more…
English [en] · PDF · 45.7MB · 2012 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 167479.94
Previous 1 2 3 4 5 Next
Previous 1 2 … 5 Next
Anna’s Archive
Home
Search
Donate
🧬 SciDB
FAQ
Account
Log in / Register
Account
Public profile
Downloaded files
My donations
Explore
Activity
Codes Explorer
ISBN Visualization ↗
Community Projects ↗
Open data
Datasets
Torrents
LLM data
Stay in touch
Contact email
Anna’s Blog ↗
Reddit ↗
Matrix ↗
Help out
Improve metadata
Volunteering & Bounties
Translate ↗
Development
Anna’s Software ↗
Security
DMCA / copyright claims
Alternatives
annas-archive.li ↗
annas-archive.se ↗
annas-archive.org ↗
SLUM [unaffiliated] ↗
SLUM 2 [unaffiliated] ↗