Home | Amazing | Today | Tags | Publishers | Years | Search 
Creating Web Pages Simplified
Creating Web Pages Simplified
The easiest way to learn how to create a Web page for your family or organization

Do you want to share photos and family lore with relatives far away? Have you been put in charge of communication for your neighborhood group or nonprofit organization? A Web page is the way to get the word out, and Creating Web Pages Simplified offers an...

Digital Painting in Photoshop
Digital Painting in Photoshop
In this inspiring book, acclaimed artist, author and lecturer Susan Ruddick Bloom shows you how to use Photoshop to turn your photographs into works of art.

Have you ever considered using Photoshop to create fine art?

Photoshop is usually used for enhancing photos, but this extremely powerful software package is capable of so
...
Technology Scorecards: Aligning IT Investments with Business Performance
Technology Scorecards: Aligning IT Investments with Business Performance
Are you dissatisfied with your business software? You're not alone. Fully 75% of organizations believe their business software is not meeting expectations. The letdown, or failure, of the technology cannot be pinned on the technology itself. Successful implementation of technology involves the integration of People, Processes, Technologies, and...
Mathematics and Physics for Programmers (Game Development Series)
Mathematics and Physics for Programmers (Game Development Series)
Many programmers frequently have limited backgrounds in the mathematics and physics needed for game development or other complex applications. Sooner or later, all programmers run into coding issues that will require an understanding of mathematics or physics concepts like collision detection, 3D vectors, transformations, game theory, or basic...
JBoss Drools Business Rules
JBoss Drools Business Rules

In business, a lot of actions are trigged by rules: "Order more ice cream when the stock is below 100 units and temperature is above 25° C", "Approve credit card application when the credit background check is OK, past relationship with the customer is profitable, and identity is confirmed", and so on. Traditional...

Joe Grand's Best of Hardware, Wireless, & Game Console Hacking: Includes DVD with 20 Hacks in High-Res Color
Joe Grand's Best of Hardware, Wireless, & Game Console Hacking: Includes DVD with 20 Hacks in High-Res Color
Before you start your hacking projects, you'll need the right arsenal of tools. For some hacks, you might need only a single screwdriver. For others, you could need a workshop complete with power tools and advanced electronic equipment. For the most part, it isn't necessary to have a world-class laboratory or top-of-the-line computer system to...
Cross-Platform Game Programming (Game Development)
Cross-Platform Game Programming (Game Development)
With many of today’s games being released simultaneously on all platforms, the need for a good cross-platform development strategy is essential. Cross-Platform Game Programming covers this rarely discussed area and provides the techniques needed to develop your games effectively. It explains the plethora of problems that exist within every...
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

Windows Server 2008 PKI and Certificate Security (PRO-Other)
Windows Server 2008 PKI and Certificate Security (PRO-Other)
Get in-depth guidance for designing and implementing certificate-based security solutions straight from PKI expert Brian Komar. No need to buy or outsource costly PKI services when you can use the robust PKI and certificate-based security services already built into Windows Server 2008! This in-depth reference teaches you how to design and...
What We Could Have Done With the Money: 50 Ways to Spend the Trillion Dollars We've Spent on Iraq
What We Could Have Done With the Money: 50 Ways to Spend the Trillion Dollars We've Spent on Iraq
The war in Iraq is not only controversial, it's also astronomically expensive. Now Rob Simpson answers the question many concerned Americans have been asking: Wasn't there some other way the government could have spent one trillion of our tax dollars?

What We Could Have Done with the Money presents 50 thought-provoking spending...

Computer Forensics: Computer Crime Scene Investigation (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (Networking Series)
The Most Comprehensive, Up-to-Date, Reference on Computer Forensics! Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package...
Managing RAID on Linux
Managing RAID on Linux
"Finally, the book contains a good index and a brief appendix giving links to other sources. A very useful volume that should find favour with anyone who wishes to implement RAID on a Linux system." - Steve Boniwell, HP/Works

Redundant Array of Independent Disks (RAID) technology is becoming a standard feature of
...
Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy