Home | Amazing | Today | Tags | Publishers | Years | Search 
DV Filmmaking: From Start to Finish : From Start to Finish
DV Filmmaking: From Start to Finish : From Start to Finish

DV Filmmaking: From Start to Finish covers all aspects of the new digital video frontier, for amateurs and professionals alike--from the nuts and bolts of timecode and aspect ratio; to framing, lighting, and sound recording; as well as editing, special effects creation, and...

Cisco ASA and PIX Firewall Handbook, First Edition
Cisco ASA and PIX Firewall Handbook, First Edition
A concise reference to implementing the most popular PIX Firewall 7.0 and 6.3 features Learn how to configure the new PIX Firewall version 7.0 Understand, install, and support the most common features of the best-selling Cisco Systems® PIX and IOS firewall products Learn from configuration examples that graphically illustrate complex...
Computer Privacy Annoyances
Computer Privacy Annoyances

From the moment you're born, you enter the data stream-from birth certificates to medical records to what you bought on Amazon last week. As your dossier grows, so do the threats, from identity thieves to government snoops to companies who want to sell you something. Computer Privacy Annoyances...

Oracle Regular Expressions Pocket Reference
Oracle Regular Expressions Pocket Reference
Oracle Regular Expressions Pocket Reference is part tutorial and part quick-reference. It's suitable for those who have never used regular expressions before, as well as those who have experience with Perl and other languages supporting regular expressions. The book describes Oracle Database 10G's support for...
Designing Scalable .NET Applications (Expert's Voice)
Designing Scalable .NET Applications (Expert's Voice)

The key issue for all enterprise developers, regardless of platform, is how to design for growth. This is the first book that addresses how to build scalable .NET applications. Given Rossberg and Redler's extensive consulting experience, this book is based on their combined real world experience with numerous large .NET installations.

...
AI Game Development
AI Game Development

Neural networks, decision trees, genetic classifiers: If these are AI concepts you'd like to employ in your own games-and you know your way around C++-this is the book for you! In these pages, leading game AI developer Alex J. Champandard shows you how to create a slew of autonomous synthetic creatures-in the process...

SUSE LINUX Enterprise Server 9 Administrator's Handbook
SUSE LINUX Enterprise Server 9 Administrator's Handbook

As a system administrator, you are justly concerned about the security of your infrastructure. SUSE Linux Enterprise Server (SLES 9) can lead the way to infrastructure security and SUSE Linux Enterprise Server Administrator's Handbook is the authoritative source for information on this secure...

Creating Web Portals with BEA WebLogic
Creating Web Portals with BEA WebLogic

Creating Web Portals with BEA WebLogic shows the beginning portal developer how to develop a portal application from start to finish, and supplies the intermediate developer with proven strategies and development techniques for creating an enterprise portal. It also provides the advanced Java application server developer with a full...

Working with Microsoft® Visual Studio® 2005 Team System
Working with Microsoft® Visual Studio® 2005 Team System

Learn how to collaborate and streamline your development process using Visual Studio Team System.

This overview of Microsoft Visual Studio 2005 Team System offers practical information and role-based guidance to get key members of your software development team working together. With insights from the Visual Studio...

Cisco IOS Essentials
Cisco IOS Essentials
Who cares about configuring network routers? Network routers are a major part of the glue that holds all computer networks together. Routers are supposed to configure themselves right? Not really. Routers aren’t to the point of being able to configure themselves, yet. They have no artificial intelligence agent so almost everything on them...
Protect Your Windows Network From Perimeter to Data
Protect Your Windows Network From Perimeter to Data
In this book, two senior members of Microsoft's Security and Business Technology Unit present a complete "Defense in Depth" model for protecting any Windows networkno matter how large or complex. Drawing on their work with hundreds of enterprise customers, they systematically address all three elements of a successful security...
Developing Online Games: An Insider's Guide
Developing Online Games: An Insider's Guide

A soup-to-nuts overview of just what it takes to successfully design, develop and manage an online game. Learn from the top two online game developers through the real-world successes and mistakes not known to others. There are Case studies from 10+ industry leaders, including Raph Koster, J. Baron, R. Bartle, D. Schubert, A....

Result Page: 1857 1856 1855 1854 1853 1852 1851 1850 1849 1848 1847 1846 1845 1844 1843 1842 1841 1840 1839 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy