Home | Amazing | Today | Tags | Publishers | Years | Search 
GIMP 2.6 cookbook
GIMP 2.6 cookbook

The GIMP project was started in 1995 by Peter Mattis and Spencer Kimball, and is now maintained by a group of volunteers under the auspices of the GNU Project. The first release was in January 1996, The latest version of GIMP, version 2.6.1, was released on December 21, 2010. Available under the terms of the GNU General Public License, GIMP...

Core Data iOS Essentials
Core Data iOS Essentials

Since its invention, iPhone has been inspiring developers around the world to develop applications for it. Several applications can be built for iPhone, which include Web applications, Native iPhone applications, Games, Weather, News applications, Data driven applications, and so on.

Looking at the huge demand of developing data...

Computer Vision - ACCV 2010: 10th Asian Conference on Computer Vision, Queenstown, New Zealand
Computer Vision - ACCV 2010: 10th Asian Conference on Computer Vision, Queenstown, New Zealand

The 2010 Asian Conference on Computer Vision took place in the southern hemisphere, in “The Land of the Long White Cloud” in Maori language, also known as New Zealand, in the beautiful town of Queenstown. If we try to segment the world we realize that New Zealand does not belong officially to any continent. Similarly, in computer...

The RSpec Book: Behaviour Driven Development with Rspec, Cucumber, and Friends (The Facets of Ruby Series)
The RSpec Book: Behaviour Driven Development with Rspec, Cucumber, and Friends (The Facets of Ruby Series)

You'll get started right away with RSpec 2 and Cucumber by developing a simple game, using Cucumber to express high-level requirements in language your customer understands, and RSpec to express more granular requirements that focus on the behavior of individual objects in the system. You'll learn how to use test doubles...

A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop...

Murach's ASP.NET 4 Web Programming with VB 2010
Murach's ASP.NET 4 Web Programming with VB 2010

This book has provided me with the information to jump right into creating web applications with Visual Basic. It is an excellent training guide and at the same time, it provides real-world examples that can be reused in multiple projects and applications. (A developer's comment on the previous edition of Murach's ASP.NET, posted...

CMS Made Simple Development Cookbook
CMS Made Simple Development Cookbook

The CMS Made Simple Development Cookbook gets you started building feature-rich sites quickly, regardless of your experience level. It contains clear recipes that introduce the key concepts behind each approach to extending the CMS, while also providing examples of solutions to real-world problems.

CMS Made Simple has great...

Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography)
Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography)

The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation – both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them...

Testing Complex and Embedded Systems
Testing Complex and Embedded Systems

Many enterprises regard system-level testing as the final piece of the development effort, rather than as a tool that should be integrated throughout the development process. As a consequence, test teams often execute critical test plans just before product launch, resulting in much of the corrective work being performed in a rush and at the...

Data Mining: A Heuristic Approach
Data Mining: A Heuristic Approach

The last decade has witnessed a revolution in interdisciplinary research where the boundaries of different areas have overlapped or even disappeared. New fields of research emerge each day where two or more fields have integrated to form a new identity. Examples of these emerging areas include bioinformatics (synthesizing biology with...

Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)

Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.

The Information Security...

Introduction to Search with Sphinx: From installation to relevance tuning
Introduction to Search with Sphinx: From installation to relevance tuning

I can’t quite believe it, but just 10 years ago there was no Google.

Other web search engines were around back then, such as AltaVista, HotBot, Inktomi, and AllTheWeb, among others. So the stunningly swift ascendance of Google can settle in my mind, given some effort. But what’s even more unbelievable is that...

Result Page: 431 430 429 428 427 426 425 424 423 422 421 420 419 418 417 416 415 414 413 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy