Home | Amazing | Today | Tags | Publishers | Years | Search 
The Graphic Designer's Digital Toolkit: A Project-Based Introduction to Adobe Photoshop CS5, Illustrator CS5 & InDesign CS5
The Graphic Designer's Digital Toolkit: A Project-Based Introduction to Adobe Photoshop CS5, Illustrator CS5 & InDesign CS5

Welcome to the Graphic Designer’s Digital Toolkit! Here you will learn the essential skills and design techniques to get you comfortable using the newest versions of the premier graphics programs in the industry today: Photoshop, Illustrator, and InDesign. This book is set up as a challenging hands-on, project-based classroom...

Heuristic Search: Theory and Applications
Heuristic Search: Theory and Applications

Search has been vital to artificial intelligence from the very beginning as a core technique in problem solving. The authors present a thorough overview of heuristic search with a balance of discussion between theoretical analysis and efficient implementation and application to real-world problems. Current developments in search such as...

Network Security Auditing (Networking Technology: Security)
Network Security Auditing (Networking Technology: Security)

Mention the word audit to IT professionals and you will probably see their eyes glaze over as they imagine frightening visions of auditors with pointy tails, pitchforks, and checklists run ning around and pointing out all of the things they have done wrong to their manager. The purpose of a security audit is not to place blame or pick...

UMTS Signaling: UMTS Interfaces, Protocols, Message Flows and Procedures Analyzed and Explained
UMTS Signaling: UMTS Interfaces, Protocols, Message Flows and Procedures Analyzed and Explained

UMTS is real. In a continuously growing number of countries we can walk in the stores of mobile network operators or resellers and take UMTS PC cards or even third-generation (3G) phones home and use them instantly. Every day the number of equipments and their feature sets gets broader. The “dream” of multimedia on mobile...

Electronic Value Exchange: Origins of the VISA Electronic Payment System (History of Computing)
Electronic Value Exchange: Origins of the VISA Electronic Payment System (History of Computing)

Most anywhere in the developed world, I can use a small rectangular piece of plastic, issued to me by a bank I have never visited, to obtain local currency or purchase goods and services directly from a merchant. The cashier and I may not even speak a common language, and the face of my card may look quite different from those carried...

Mike Meyers' CompTIA A+ Guide to Managing and Troubleshooting PCs, Third Edition
Mike Meyers' CompTIA A+ Guide to Managing and Troubleshooting PCs, Third Edition

Essential Skills for a Successful IT Career

Written by CompTIA certification and training expert Mike Meyers, this instructive, full-color guide will help you pass the CompTIA A+ exams and become an expert hardware technician. Mike Meyers' CompTIA A+ Guide to Managing and Troubleshooting PCs, Third Edition is...

Clojure in Action
Clojure in Action

I can tell you how much I enjoy being a geek. I can tell you how fascinated I was with the punch-cards my dad showed me back in 1985. I can tell you how I got my first computer when I was seven. And I can tell you that I’ve loved programming since 1989. I can tell you a great many things about all that, but I’m not sure how...

Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)
Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)

From time immemorial, the security realm and personal identification task had shown progress by employing technological means like secret knowledge as passwords and Personal Identification Numbers, and by using personal possessions as identity cards and Radio Frequency Identification chips. As opposed to these means which are...

IBM Sametime 8.5.2 Administration Guide
IBM Sametime 8.5.2 Administration Guide
Allow me to be the first to congratulate you for purchasing this book. Sametime 8.5 is a very different product from previous versions of the product. What once was a simple offering that provided secure instant messaging with some web conferencing capabilities has now evolved into a robust, flexible, sophisticated communications...
PSP Game Creation for Teens
PSP Game Creation for Teens
Games have come a long way since their inception far in our past. The tools we have used in our game play have changed, as well, from knuckle bones to cards to board games to early arcade games to today’s spiffy video game consoles. The progression has been a lengthy one. Now hardware advances are even changing the way we...
Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all...

The Non-Designer's InDesign Book
The Non-Designer's InDesign Book

Many designers and photographers own the entire suite of Adobe’s creative products, but they manage to learn only one or two of the applications really well. If Adobe InDesign is the one app in the suite that makes you feel like you’re entering a foreign country where you don’t speak the language,...

Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy