| You don't have to be a programmer to achieve amazing effects with the hundreds of Flash components available from Macromedia and various third parties. Step by step, The Hidden Power of Flash Components shows you how.
For those of you with just a little programming experience, this book also demonstrates how to build your own components to use and share with other developers. Whatever your aims, and regardless of your experience, soon all the power of this incredible Flash feature will be within your reach. Coverage includes:
- Determining the most effective ways to leverage components
- Avoiding component pitfalls
- Customizing external resources for use with components
- Building your own components
- Building a custom UI, Live Preview, and MXP file for a component
- Customizing component artwork
- Using components to build games
- Understanding the difference between components and SmartClips
- Troubleshooting component construction and application
- Using multiple components to create more complex effects
|
|
|
Principles of Digital Communication Systems and Computer NetworksPrinciples of Digital Communication Systems and Computer Networks is designed as a textbook for courses on digital communication systems, data communication, computer networks, and mobile computing. Part I deals with key topics such as information theory, transmission media, coding, error correction, multiplexing, multiple access,... | | Microsoft Encyclopedia of Networking, Second EditionWhether you're a system administrator, MCSA/MCSE certification candidate, or a CIO-here's definitive reference on the latest networking technologies and terminology. The superbly illustrated MICROSOFT ENCYCLOPEDIA OF NETWORKING, Second Edition, features thousands of entries-including many new entries and critical updates and revisions to the... | | IoT Security Issues
IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack... |
|