Home | Amazing | Today | Tags | Publishers | Years | Search 
The Photoshop Elements 9 Book for Digital Photographers (Voices That Matter)
The Photoshop Elements 9 Book for Digital Photographers (Voices That Matter)

This book breaks new ground by doing something for digital photographers that’s never been done before—it cuts through the bull and shows you exactly “how to do it.” It’s not a bunch of theory; it doesn’t challenge you to come up with your own settings or figure things out on your own. Instead, it does...

HP-UX 11i Tuning and Performance (2nd Edition)
HP-UX 11i Tuning and Performance (2nd Edition)

Maximizing the performance of Unix systems is a challenge that requires a specialized understanding of operating system behavior, knowledge of the design and tuning capabilities of the applications that run on the system, and an intimate acquaintance with system and application performance measuring tools that assist in...

Microsoft SharePoint 2010 Administration Cookbook
Microsoft SharePoint 2010 Administration Cookbook

SharePoint 2010 enables businesses to set up collaboration with, and for, many types of entities (employees, vendors, customers, and so on) while integrating disparate technologies. It has proved so valuable a tool at many organizations that its growth has led it to become a mission-critical application. As SharePoint has grown through each...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Flash Professional CS5 Advanced for Windows and Macintosh: Visual QuickPro Guide
Flash Professional CS5 Advanced for Windows and Macintosh: Visual QuickPro Guide

Flash is one of the most pervasive technologies on the Web, delivering interactive and immersive multimedia. Leading corporate Web sites use its streamlined graphics to communicate their brands, major motion picture studios promote theatrical releases with Flash video, and online news and educational sites provide rich user...

Convergence of Mobile and Stationary Next-Generation Networks
Convergence of Mobile and Stationary Next-Generation Networks

The optical networking technology that suffered in the post - dot - com crash several years ago has since recovered and is once again poised for rapid growth due to the exhaustion of available bandwidth. Today, photonics networks transport Internet data over large distances in long - haul and metropolitan networks. Improvements in...

Essentials of Online payment Security and Fraud Prevention (Essentials Series)
Essentials of Online payment Security and Fraud Prevention (Essentials Series)

Doing business online is no longer an oddity, but the norm, and companies desiring to remain competitive have to maintain some form of online presence. Doing business online means a company has to be able to efficiently, reliably, and securely take payments from consumers and other merchants. This book is written to provide the...

Data Mining and Knowledge Discovery Handbook (Texts and Monographs in Physics)
Data Mining and Knowledge Discovery Handbook (Texts and Monographs in Physics)

Knowledge Discovery demonstrates intelligent computing at its best, and is the most desirable and interesting end-product of Information Technology. To be able to discover and to extract knowledge from data is a task that many researchers and practitioners are endeavoring to accomplish. There is a lot of hidden knowledge waiting to be...

Practical Oracle Security: Your Unauthorized Guide to Relational Database Security
Practical Oracle Security: Your Unauthorized Guide to Relational Database Security

A senior database manager at one of the world’s largest banks once told me that the best way to secure Oracle is to unplug it from the wall…and he is probably right. In fact, this holds true for nearly every networked application. Unfortunately, for many of us turning off the database is not an option; we must find another way to...

Google Web Toolkit 2 Application Development Cookbook
Google Web Toolkit 2 Application Development Cookbook

GWT 2 radically improves web experience for users by using existing Java tools to build no-compromise AJAX for any modern browser. It provides a solid platform so that other great libraries can be built on top of GWT. Creating web applications efficiently and making them impressive, however, is not as easy as it sounds. Writing web...

Access to Knowledge in the Age of Intellectual Property
Access to Knowledge in the Age of Intellectual Property

At the end of the twentieth century, intellectual property rights collided with everyday life. Expansive copyright laws and digital rights management technologies sought to shut down new forms of copying and remixing made possible by the Internet. International laws expanding patent rights threatened the lives of millions of people around the...

Handbook of Face Recognition
Handbook of Face Recognition

Face recognition has a large number of applications, including security, person verification, Internet communication, and computer entertainment. Although research in automatic face recognition has been conducted since the 1960s, this problem is still largely unsolved. Recent years have seen significant progress in this area owing to advances...

Result Page: 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy