 |
|
 Introducing Reason 4Welcome to Introducing Reason 4. Whether you already have experience with digital music creation or are completely new to it, you are probably aware that the possibilities available today for creating music in the digital environment are truly staggering. Over the last decade as computers have gotten faster and available storage space has... |  |  Nonlinear Digital Filters: Analysis and ApplicationsThis book provides an easy to understand overview of nonlinear behavior in digital filters, showing how it can be utilized or avoided when operating nonlinear digital filters. It gives techniques for analyzing discrete-time systems with discontinuous linearity, enabling the analysis of other nonlinear discrete-time systems, such as sigma delta... |  |  Footprints Of The JesuitsThis scarce antiquarian book is included in our special Legacy Reprint Series. In the interest of creating a more extensive selection of rare historical book reprints, we have chosen to reproduce this title even though it may possibly have occasional imperfections such as missing and blurred pages, missing text, poor pictures, markings, dark... |
|
 |  |  |  |  Recording Tips for Engineers, Second Edition: For cleaner, brighter tracks"Crammed with everything you need, and I mean everything. Simple explanations with brilliant illustrations, every conceivable studio tip and trick, a few 'rock star' anecdotes and, as usual, Tim's humor is great." Bob Schwall, Battery Studios
Over a thousand easy-to-use tips, hints, tricks, how-tos, setups,... |
|
 |  |  Network Security: A Practical Guide (Computer Weekly Professional)Network Security: a practical guide provides a comprehensive review of network security issues, with relevance to corporate networks, from both an administrative and user perspective. It is particularly suited to IS executives, administrators and managers who wish to review their own network security procedures or for those... |  |  |
|
 Web Services Security and E-businessMany techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,... |  |  Photoshop for Right-Brainers: The Art of Photo ManipulationAttention Right-Brainers! You're an artistic visionary, right? In your head you imagine clever image fixes, fanciful photo manipulations, and artworks of startling genius. But when it comes to bringing these visions to life on your computer -- well, that’s the hard part. If this sounds... |  |  CISSP: Certified Information Systems Security Professional Study GuideHere's the book you need to prepare for the CISSP exam from (ISC)2. Written by a team of experienced security experts who know exactly what it takes to pass the test, this Study Guide provides:
Assessment testing to focus and direct your studies In-depth coverage of official test domains Hundreds of challenging practice questions, in the book... |
|
| Result Page: 296 295 294 293 292 291 290 289 288 287 286 285 284 283 282 281 280 279 278 |