 |
|
 The Essential Guide to Flash CS4If you're familiar with the basics of Flash, then The Essential Guide to Flash CS4 will take you further in all aspects of the application, animation, sound, 3D, Inverse Kinematics, the drawing tools, ActionScript, and much more. This book takes all the good bits of Flash CS4 and demonstrates them in methodical and intuitive exercises full of hints... |  |  Programming the iPhone User ExperienceApple's iPhone and iPod Touch not only feature the world's most powerful mobile operating system, they also usher in a new standard of human-computer interaction through gestural interfaces and multi-touch navigation. This book provides you with a hands-on, example-driven tour of UIKit, Apple's user interface toolkit, and includes common design... |  |  Agile CoachingTo lead change, you need to expand your toolkit, and this book gives you the tools you need to make the transition from agile practitioner to agile coach. Agile Coaching is all about working with people to create great agile teams. You'll learn how to build a team that produces great software and has fun doing it. In the... |
|
 ASP.NET MVC in ActionThe final version of ASP.NET MVC 1.0 was released March 2009 during the Mix 09 conference and nobody was caught by surprise with what was inside—and this is a good thing. Before the debut of the final version, the product team had released multiple public previews with full source code in an effort to raise the bar on openness and community... |  |  WebSphere Application Server 7.0 Administration GuideAs an administrator you need a secure, scalable, resilient application infrastructure to support the developers building and managing J2EE applications and Service Oriented Architecture services. WebSphere application server, a product from IBM, is optimized to ease administration and improve runtime performance. It helps you run applications and... |  |  Joomla! 1.5 SEOSome sites always appear at the top of a search result while others fail to even make it to the top ten. Wouldn't you want to see your site on the first page of any search result? This is not easily feasible if you are depending solely on the marketing guys whom you hire for SEO.
Joomla! SEO will help you to attract more visitors and... |
|
 HTML, XHTML & CSS QuickStepsStep-by-Step, Full-Color Graphics!
Learn how to use HTML, XHTML, and CSS, right away--the QuickSteps way. Color photos and screenshots with clear instructions show you how to build your own website, add graphics and links, and create tables and frames. Learn how to apply the power and flexibility of XHTML and CSS to your... |  |  Oracle SQL Recipes: A Problem-Solution ApproachHave you ever been faced with a new type of query to write, or been asked to create an unfamiliar database object? In such situations, you have probably wanted a good, solid example upon which to build, and instead have been forced into the drudgery of parsing railroad-style syntax diagrams in Oracle's manual set. This book frees you from that... |  |  Cloud and Precipitation Microphysics: Principles and ParameterizationsThis book focuses specifically on bin and bulk parameterizations for the prediction of cloud and precipitation at various scales - the cloud scale, mesoscale, synoptic scale, and the global climate scale. It provides a background to the fundamental principles of parameterization physics, including processes involved in the production of clouds, ice... |
|
 Lean Six Sigma Secrets for the CIO: ITIL, COBIT, and BeyondGoing beyond the usual how-to guide, Lean Six Sigma Secrets for the CIO supplies proven tips and valuble case studies to illustrate how to combine Six Sigma’s rigorous quality principles with Lean methods for uncovering and eliminating waste in your IT processes. Using these methods, the text explains how to take an... |  |  Ubiquitous Computing Fundamentals…a must-read text that provides a historical lens to see how ubicomp has matured into a multidisciplinary endeavor. It will be an essential reference to researchers and those who want to learn more about this evolving field.
-From the Foreword, Professor Gregory D. Abowd, Georgia Institute of Technology ... |  |  Hacking Exposed Malware & Rootkits
Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been... |
|
Result Page: 518 517 516 515 514 513 512 511 510 509 508 507 506 505 504 503 502 501 500 |