Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Medium Format Advantage, Second Edition
The Medium Format Advantage, Second Edition
Learn the advantages and capabilities of medium-format cameras and examine all aspects of medium-format operations, including SLR, twin lens, panoramic, rangefinder, wide angle, press, and view cameras. Also explained and illustrated are lenses and their accessories, motor drives, films, flashes, filters, slides and slide projectors, and more....
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

Building Resilient IP Networks (Cisco Press Networking Technology)
Building Resilient IP Networks (Cisco Press Networking Technology)

The practical guide to building resilient and highly available IP networks

  • An all-in-one introduction to the various new features and developments in building a resilient IP network

  • A singular source on what Cisco hardware, software...

Movie Greats: A Critical Study of Classic Cinema
Movie Greats: A Critical Study of Classic Cinema
Why are some films regarded as classics, worthy of entry into the canon of film history? Which sorts of films make the cut and why? Movie Greats questions how cinema is ranked and, in doing so, uncovers a history of critical conflict, with different aesthetic positions battling for dominance.
 
The...
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
301 Inkjet Tips and Techniques: An Essential Printing Resource for Photographers (Digital Process and Print)
301 Inkjet Tips and Techniques: An Essential Printing Resource for Photographers (Digital Process and Print)
From the birth of photography in the 19th century with the work of Frenchmen Joseph Nicéphore Niépce and Louis Jacques Mande Daguerre, Englishman William Fox Talbot, and American John Locke, until today, at the beginning of the 21st century, the ultimate goal of photographers has always been to show their best...
The Lucent Library of Science and Technology - Black Holes
The Lucent Library of Science and Technology - Black Holes
"The science is accurate, and the story is well told in terms of both presenting the history of the investigation of black holes and providing some insights into the scientists themselves. The illustrations placed throughout the volume help readers understand the intricacies associated with these strange phenomena...A glossary and three...
Introducing Fedora: Desktop Linux
Introducing Fedora: Desktop Linux

Many people think of Fedora as an operating system that is way over their heads -- that only techies can use this strange, arcane OS with the odd name. Introducing Fedora: Desktop Linux is here to tell you that this is simply not the case. Fedora, and Linux in general, have become very easy for everyday home and business users to install and...

The Art of Black and White Photography: Techniques for Creating Superb Images in a Digital Workflow
The Art of Black and White Photography: Techniques for Creating Superb Images in a Digital Workflow

Over the last few years, most books on photography have been focused on the new breed of cameras and how to master the digital imaging workflow. In The Art of Black and White Photography author and photographer Torsten Andreas Hoffmann takes a different approach, focusing on image composition and image capture, with an emphasis on...

Inside the SQL Server Query Optimizer
Inside the SQL Server Query Optimizer

The SQL Server Query Optimizer is perceived by many to be a magic black box, transforming SQL queries into high performance execution plans in the blink of an eye through some unknowable process. The truth is that, while the Query Optimizer is indeed the highly-complex result of decades of research, learning how it works its magic is not only...

Queenpins: Notorious Women Gangsters of The Modern Era
Queenpins: Notorious Women Gangsters of The Modern Era

The cut throat world of organized crime has long been dominated by men, and such macho godfathers and kingpins as Al Capone, John Dillinger, Pablo Escobar and John Gotti have become legendary. Yet, dig deep into the annals of crime and one can find smart, ambitious and ruthless women who have cracked the glass ceiling of the underworld and...

Lean Sigma: A Practitioner's Guide
Lean Sigma: A Practitioner's Guide

Lean Sigma delivers resultsif you use the right tools and techniques. In Lean Sigma: A Practitioner's Guide, Dr. Ian Wedgwood captures best-practice Lean Sigma experience from multiple projects and industries, helping any professional identify the solution that...

unlimited object storage image
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy