Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Protection for Photographers: A Guide to Storing and Protecting Your Valuable Digital Assets
Data Protection for Photographers: A Guide to Storing and Protecting Your Valuable Digital Assets

All photographers, both amateur and professional, are faced with the important issues of data protection and storage. Without knowledge of the options, tools, and procedures for safe and effective image protection and storage, photographers run the serious risk of losing their image files. This book offers critical information about the best...

Understand Electronics, Second Edition
Understand Electronics, Second Edition
In Understand Electronics, Owen Bishop covers the basics needed in all the main areas of electronics with a jargon-free, informative style, and numerous illustrations.

An essential book for the newcomer to electronics, this highly practical guide provides a thorough introduction to practical electronics and the basic principles of
...
Windows 10 Development Recipes: A Problem-Solution Approach in HTML and JavaScript
Windows 10 Development Recipes: A Problem-Solution Approach in HTML and JavaScript

This book is a practical guide to solving the everyday problems encountered when building apps for Windows 10 devices, including desktops, laptops, tablets, and phones, using HTML5, CSS3 and JavaScript.

Each recipe includes a concise statement of the problem and the approach you should take in order to solve it. A full code...

Microsoft Office 2003 Editions Resource Kit
Microsoft Office 2003 Editions Resource Kit

Whether you’re a small business or a global organization, deploy and support Microsoft Office 2003 Editions with expertise direct from the Microsoft Office product team. This official Resource Kit packs the in-depth technical information you need to customize and install Office, plan and implement messaging with Microsoft...

The International Handbook of Computer Security
The International Handbook of Computer Security
This book is a one-stop resource to help executives and computer professionals protect their systems and data from a myriad of internal and external threats. Addressing a wide range of security issues, it provides practical guidance on topics such as: physical security procedures * data preservation and protection * hardware and software protection...
SolidWorks Administration Bible
SolidWorks Administration Bible

Welcome to the SolidWorks Administration Bible. This book has been written as a desk reference for anyone charged with installing, implementing, and maintaining SolidWorks and Workgroup PDM for yourself or for other users in your company.

Whether you are a professional CAD Administrator, a full-time engineer or designer pressed...

The Investigator's Guide to Computer Crime
The Investigator's Guide to Computer Crime

In the past half-century we have gone from a world where computers were science fiction to a world where computers are everyday fact. Just thirty years ago the computer that flew with the first astronauts to the moon had less computing power than the computer on the average student’s desk today. Computers have grown in popularity,...

Macromedia Flash 8 On Demand
Macromedia Flash 8 On Demand

Offers readers a fast, visual way to learn Flash 8, enabling one to create interactive web sites.

  • Step-by-step instructions with accompanying 4-color visuals requires less time reading and more time learning this popular software

  • ...
Google Hacking for Penetration Testers
Google Hacking for Penetration Testers
Google Hacking for Penetration Testers explores the explosive growth of a technique known as "Google Hacking." This simple tool can be bent by hackers and those with malicious intents to find hidden information, break into sites, and access supposedly secure information. Borrowing the techniques pioneered by malicious...
The Definitive Guide to Terracotta: Cluster the JVM for Spring, Hibernate and POJO Scalability
The Definitive Guide to Terracotta: Cluster the JVM for Spring, Hibernate and POJO Scalability
Get the definitive guide on all the fundamentals of Terracotta as well as user secrets, recipes, and prepackaged frameworks.

Written by Terracotta CTO Ari Zilka and his team, The Definitive Guide to Terracotta: Cluster the JVM for Spring, Hibernate and POJO Scalability covers the following:

Beginning iOS Apps with Facebook and Twitter APIs: for iPhone, iPad, and iPod touch
Beginning iOS Apps with Facebook and Twitter APIs: for iPhone, iPad, and iPod touch

Beginning iOS Apps with Facebook and Twitter APIs shows you how to add the power of social networking to your mobile apps on iPhone, iPad, and iPod touch. With this book as your guide, you can write apps that connect to Facebook and Twitter quickly, securely, and discreetly. Instead of starting from scratch, you will build on the...

The Definitive Guide to NetBeans™ Platform 7
The Definitive Guide to NetBeans™ Platform 7
With this work in your hands, you hold the most current and the most comprehensive guide to the Swing-based rich client platform, NetBeans Platform 7. This theme-rich client platform is highly topical. In addition to the NetBeans Platform, Eclipse RCP is also a principal representative of this category. The development of these two...
unlimited object storage image
Result Page: 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy