Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Introducing Autodesk Maya 2012 (Autodesk Official Training Guides)
Introducing Autodesk Maya 2012 (Autodesk Official Training Guides)

Welcome to Introducing Autodesk Maya 2012 and the world of computer-generated imagery (CGI). Whether you’re new to 3D graphics or venturing into Autodesk’s powerhouse animation software from another 3D application, you’ll find this book a perfect primer. It introduces you to Maya and shows how you can work with Maya to...

IBM Websphere Portal 8: Web Experience Factory and the Cloud
IBM Websphere Portal 8: Web Experience Factory and the Cloud
When I joined IBM in early 2001, WebSphere Portal was little more than an idea. But some believed this was going to be the future of web technology. When WebSphere Portal v1 was released later in that same year, spending the time required to cobble together the components needed to make it run, was an exercise in patience and...
Microsoft Dynamics GP 2013 Cookbook
Microsoft Dynamics GP 2013 Cookbook

For beginners or intermediate users this is a highly practical cookbook for Microsoft Dynamics GP. Now you can really get to grips with enterprise resource planning by engaging with real-world solutions through recipes and screenshots.

Overview

  • Understand the various tips and tricks to master Dynamics GP,...
Brandwashed: Tricks Companies Use to Manipulate Our Minds and Persuade Us to Buy
Brandwashed: Tricks Companies Use to Manipulate Our Minds and Persuade Us to Buy

Foreword by Morgan Spurlock

From the bestselling author of Buyology comes a shocking insider’s look at how today’s global giants conspire to obscure the truth and manipulate our minds, all in service of  persuading us to buy.

 
Marketing visionary Martin Lindstrom has been on the
...

Error Correction Codes for Non-Volatile Memories
Error Correction Codes for Non-Volatile Memories

Nowadays it is hard to find an electronic device which does not use codes: for example, we listen to music via heavily encoded audio CD's and we watch movies via encoded DVD's. There is at least one area where the use of encoding/decoding is not so developed, yet: Flash non-volatile memories. Flash memory high-density, low power, cost...

Learning SPARQL
Learning SPARQL

More and more people are using the query language SPARQL (pronounced “sparkle”) to pull data from a growing collection of public and private data. Whether this data is part of a semantic web project or an integration of two inventory databases on different platforms behind the same firewall, SPARQL is making it easier to access...

Expert Web Services Security in the .NET Platform
Expert Web Services Security in the .NET Platform

Any company using .NET will eventually (if it hasn't already) expose part of its functionality as a .NET Web service, and securing these features will become job number one. Completely up to date for the latest version of Visual Studio .NET, Expert Web Services Security in the .NET Platform is a comprehensive treatment on how to...

Diseases of the Liver & Biliary System
Diseases of the Liver & Biliary System
The eleventh edition welcomes the new Millenium. Progress in basic and clinical hepatology remains exponential. Since 1997, the advances have been wideranging, with those in molecular and cellular biology, and in diagnosis and treatment, leading the way. In a world in which information technology gives all too ready...
Mastering Reverse Engineering: Re-engineer your ethical hacking skills
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features

  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching...
Enterprise Web Services Security (Internet Series)
Enterprise Web Services Security (Internet Series)
Learn to Protect Your Assets and Prevent Attacks!

The use of Web Services for Business-to-Business (B2B) and Business-to-Consumer (B2C) transactions has created risks that expose critical assets to increasingly greater threats. Enterprise Web Services Security provides the information developers, application architects, and security...

Mobilized Marketing and the Consumer: Technological Developments and Challenges
Mobilized Marketing and the Consumer: Technological Developments and Challenges

Mobilized Marketing and the Consumer: Technological Developments and Challenges explores technological developments and widespread issues concerning the explosion of mobile devices in the information age. Providing breakthrough research on topics such as Bluetooth, mobile phones, and online portals, this innovative publication...

Essential SQLAlchemy
Essential SQLAlchemy

If you’re an application programmer you’ve probably run into a relational database at some point in your professional career. Whether you’re writing enterprise client-server applications or building the next Web 2.0 killer application, you need someplace to put the persistent data for your application, and relational...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy