|
|
|
|
|
Running Linux, Fourth EditionThis is a book about Linux, a free, open source operating system that's changing the world of computing. In this book, we show how you can completely change the way you work with computers by exploring a powerful and free operating system. Linux goes against the traditional computing mainstream, being developed by a loosely organized... | | Advanced Photoshop Elements 6 for Digital PhotographersThink you've exhausted all of the possibilities in Adobe's awesome Photoshop Elements software? Think again. In this fully updated essential guide, Philip Andrews delves deeper into the software than ever before with advanced tips, tricks, and techniques to help the experienced Elements user take their skills to the next level. Move beyond the... | | The Official Photodex Guide to ProShowWith the amazing, easy-to-use features of ProShow, you can create polished multimedia productions that sizzle! Presentations are a growing part of everyday life, from the conference room to the living room, and today’s viewers want presentations that pop. "The Official Photodex® Guide to ProShow®" is the solution. A... |
|
|
Python Programming for the Absolute Beginner, 3rd Edition
If you are new to programming with Python and are looking for a solid introduction, this is the book for you. Developed by computer science instructors, books in the "for the absolute beginner" series teach the principles of programming through simple game creation. You will acquire the skills that you need for practical Python... | | Debugging by Thinking : A Multidisciplinary Approach (HP Technologies)Debugging by Thinking: A Multidisciplinary Approach uses the methods of literary detectives such as Sherlock Holmes, the techniques of mathematical problem solving, the results of research into the cognitive psychology of human error, the root cause analyses of safety experts, the compiler analyses of computer science, and the... | | Hack I.T.: Security Through Penetration TestingPenetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from... |
|
|
Result Page: 260 259 258 257 256 255 254 253 252 251 250 249 248 247 246 245 244 243 242 |