Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Accessible EPUB 3
Accessible EPUB 3
Accessibility is a difficult concept to define. There’s no single magic bullet solution that will make all content accessible to all people. Perhaps that’s a strange way to preface a book on accessible practices, but it’s also a reality you need to be aware of. Accessible practices change, technologies evolve to...
The Digital Matte Painting Handbook
The Digital Matte Painting Handbook

From an early age, I wanted to be an artist. I was drawn first to comic books and then to science-fiction literature because of the wondrous images that fed my artistic imagination. When I read Edgar Rice Burroughs, Robert Heinlein, and Isaac Asimov as an adolescent, I would spend as much time studying the covers as I did reading the books,...

From Photoshop to Dreamweaver
From Photoshop to Dreamweaver

This book will show you how to combine the power of Adobe Photoshop 7 and Macromedia Dreamweaver MX, both the premier applications in their fields.

The book's core purpose is to teach the fundamentals of designing for the web using Photoshop and Dreamweaver, through a combination of theory and practical examples. We will start...

Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security
Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security

The field of structured P2P systems has seen fast growth upon the introduction of Distributed Hash Tables (DHTs) in the early 2000s. The first proposals, including Chord, Pastry, Tapestry, were gradually improved to cope with scalability, locality and security issues. By utilizing the processing and bandwidth resources  of end users, the...

Security in E-Learning (Advances in Information Security)
Security in E-Learning (Advances in Information Security)
As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand security issues relevant to this topic. Security in E-Learning discusses typical threats to e-learning projects and introduces how these issues have been and should be addressed. This knowledge is essential to conduct a security risk...
Sukhoi Su-27: Famous Russian Aircraft
Sukhoi Su-27: Famous Russian Aircraft
In the late 1960s, the Soviet Union became aware that the U.S. was developing a new generation of jet fighters that had an exceptional range, heavy armor, and great agility in the air. These U.S. aircraft, the F-14 Tomcat, F-15 Eagle, F-16 Fighting Hornet, and F/A-18 Hornet dominated U.S. air power for three decades. In the context of the Cold War,...
Quantitative MRI of the Brain: Measuring Changes Caused by Disease
Quantitative MRI of the Brain: Measuring Changes Caused by Disease

This book was conceived one balmy March evening on the banks of the river Brisbane, in Queensland, Australia, where I had just arrived for a sabbatical, and it became clear that the traditions of measurement science and MRI should meet. The notion of a guide, a cook-book, for quantitative MRI (qMR) techniques took seed, and attained its own...

Macromedia® Dreamweaver® MX Dynamic Applications: Advanced Training from the Source
Macromedia® Dreamweaver® MX Dynamic Applications: Advanced Training from the Source

As a designer himself, author Jeffrey Bardzell is keenly aware of the dilemma you're faced with today: With clients and users demanding more than the static, HTML pages that defined first-generation Web sites, you have no choice but to migrate to dynamic, service based sites. But that means a world of programming, servers,...

Security on Rails
Security on Rails

The advantage of using Rails is its agility; it makes developing your web applications easy and fast. The disadvantage is that it can leave holes in your security if you are not aware of common vulnerabilities. It's a nerve-wracking and unfortunate fact that there are plenty of malicious people lurking on the Web. As a Rails developer, it...

Chemical Mechanical Polishing in Silicon Processing, Volume 63
Chemical Mechanical Polishing in Silicon Processing, Volume 63
In the engineering world, many ideas and plans are conceived in the information exchanges that occur over lunch. In the summer of 1997, one of the editors (Shin Hwa Li) was assigned to assist our CMP module at the Crolles facility of STMicroelectronics near Grenoble, France. One day, in the company cafeteria, while sitting near...
Android Cookbook
Android Cookbook

Jump in and build working Android apps with the help of more than 200 tested recipes. With this cookbook, you’ll find solutions for working with the user interfaces, multitouch gestures, location awareness, web services, and device features such as the phone, camera, and accelerometer. You also get useful steps on packaging...

Foundations of Computer Security
Foundations of Computer Security
Anyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, and disk crashes. This book is intended as a starting point for those familiar with basic concepts of computers and computations and who would like to extend their knowledge into the realm of computer and network security. Its...
unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy