|
|
|
|
After Effects ExpressionsExpressions are tools. Just as you use the Rotation tool and the Pen tool, you can use Expressions to control animation and composition in After Effects (AE).
Whereas you use most tools by clicking on their icons (e.g., the pointer or the pen) and clicking or dragging with the mouse, you use Expressions by typing commands on the... | | Microsoft Windows Home Server Unleashed (2nd Edition)
This is the most comprehensive, practical, and useful guide to Windows Home Server, including Microsoft’s major updates in PowerPacks 1, 2, and 3. Top Windows expert Paul McFedries brings together tips, techniques, and shortcuts available nowhere else and presents them all in plain English for every Windows Home... | | Learning VBScript (Nutshell Handbooks)
With the advent of client-side scripting, it is possible to create programs that run on a user's browser in response to particular user actions, like passing the mouse over a hyperlink or clicking a standard HTML command button. By taking advantage of client-side scripts, web pages can be made more interactive, and programs that... |
|
Windows XP in a NutshellThis compact and comprehensive book systematically unveils what resolute users of the new Windows XP operating system will find interesting and useful, with little-known details, utility programs, and configuration settings all captured in a consistent reference format.
A hands-on guide, Windows XP in a Nutshell cuts through the hype... | | GWT in PracticeIf you're a web developer, you know that you can use Ajax to add rich, user-friendly, dynamic features to your applications. With the Google Web Toolkit (GWT), a new Ajax tool from Google that automatically converts Java to JavaScript, you can build Ajax applications using the Java language.
GWT in Practice is an example-driven,... | | UNIX and Linux Forensic Analysis DVD ToolkitThe only Forensic Analysis book covering UNIX, which runs 37% of network servers worldwide.
This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account... |
|
|
The Definitive Guide to symfonyDeveloping a new web application should not mean reinventing the wheel. Thats why a framework is an essential item in your development toolbox. It helps you respect coding standards; write bulletproof, maintainable code; and focus on business rules rather than waste time on repetitive tasks. This book introduces you to symfony, the leading... | | Web Application Vulnerabilities: Detect, Exploit, PreventThis book is about Web Application Hacking. The world-renowned authors teach the reader to use publicly available tools to conduct thorough assessments of web application. This assessment process provides the reader with an understanding of Web application vulnerabilities and how they are exploited. The book goes on to teach the reader to detect,... | | |
|
|
Result Page: 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 |