 |
|
|
 Digital Lighting and Rendering (2nd Edition)Crafting a perfect rendering in 3D software means nailing all the details. And no matter what software you use, your success in creating realistic-looking illumination, shadows and textures depends on your professional lighting and rendering techniques. In this lavishly illustrated new edition, Pixar's Jeremy Birn shows you how... |  |  The Definitive Guide to Apache mod_rewritemod_rewrite, frequently called the “Swiss Army Knife” of URL manipulation, is one of the most popular—and least understood—modules in the Apache Web Server’s bag of tricks. In this chapter we’ll discuss what it is, why it’s necessary, and the basics of using it. For many people, mod_rewrite... |  |  PCs For Dummies Quick Reference (Computer/Tech)Fast answers to frequently asked questions
All the PC essentials at your fingertips!
If you like your answers quick and your information up-to-date, look no further. This concise, superbly organized reference walks you through setting up a PC, connecting all the parts, using programs, organizing your stuff, storing things on disk,... |
|
 SUSE Linux 10 For Dummies (Computer/Tech)SUSE Linux is an increasingly popular Linux distribution that competes headon with Red Hat’s Linux versions. SUSE Linux’s fortunes have been on the rise following Novell’s acquisition of Germany’s SUSE Linux AG and the recent initiation of the openSUSE project (www.opensuse.org) — an open source ... |  |  Apple Pro Training Series : Advanced Editing Techniques in Final Cut Pro 5In the only Apple-certified guide to advanced video editing techniques, award-winning filmmaker Michael Wohl delivers comprehensive training in the real-world skills that professionals use every day. Working through six hours of superb raw footage on two DVD-9 discs, you'll learn to cut dialogue, action, comedy, chases, fights, interviews,... |  |  Exploiting Software : How to Break CodeHow does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers. Exploiting Software is loaded with examples of real attacks, attack patterns, tools,... |
|
|
| Result Page: 9 8 7 6 5 4 3 2 1 |