Home | Amazing | Today | Tags | Publishers | Years | Search 
The Web Designer's Guide to iOS Apps: Create iPhone, iPod touch, and iPad apps with Web Standards
The Web Designer's Guide to iOS Apps: Create iPhone, iPod touch, and iPad apps with Web Standards

If you are a designer who knows HTML, CSS, and JavaScript, you can easily learn how to make native iPhone, iPod touch, and iPad apps—and distribute them worldwide via the App Store. When combined with an Objective-C framework, web standards can be used to format and style content for iOS, using native controls and behaviors for an...

Software Testing with Visual Studio 2010 (Microsoft .NET Development Series)
Software Testing with Visual Studio 2010 (Microsoft .NET Development Series)

AS A PROCES S IMPROVEMENT professional, I have experienced many team challenges. Big challenges. It is not unusual to see teams that seem so perfectly compatible start in excitement only to fizzle in different directions and end up not working together. Products suffer, customers suffer, and ultimately...

Apple Pro Training Series: Aperture 3
Apple Pro Training Series: Aperture 3

Welcome to the official Apple Pro Training course for Aperture, the powerful photo editing and management software from Apple. This book includes a variety of real-world photography projects, which are used as clear examples of the way Aperture works, from import and organization to image editing and output.

Whether...

3D Art Essentials: The Fundamentals of 3D Modeling, Texturing, and Animation
3D Art Essentials: The Fundamentals of 3D Modeling, Texturing, and Animation

This book was written to give beginning 3D artists a map through the art and how to get involved in the 3D industry. You can use this book by reading all the way through it cover to cover with or without doing the tutorials, by picking and choosing chapters based on gaps you want to fill, or as a quick reference to a concept you...

Active Directory: Designing, Deploying, and Running Active Directory, Fourth Edition
Active Directory: Designing, Deploying, and Running Active Directory, Fourth Edition

Active Directory is a common repository for information about objects that reside on the network, such as users, groups, computers, printers, applications, and files. The default Active Directory schema supports numerous attributes for each object class that can be used to store a variety of information. Access Control Lists (ACLs) are...

Microsoft Silverlight 4 and SharePoint 2010 Integration
Microsoft Silverlight 4 and SharePoint 2010 Integration

Silverlight is a powerful development platform for creating engaging, interactive user experiences for web, desktop, and mobile applications. Integrating Silverlight RIAs in SharePoint 2010 offers amazing opportunities to combine the power and flexibility offered by SharePoint. It is easy to create great user experiences when you have a...

Photoshop CS3 Essential Skills (Photography Essential Skills)
Photoshop CS3 Essential Skills (Photography Essential Skills)

Brimming with beautiful pictures, this successful book guides you through a project-based, progressive curriculum so that you can build all the essential skills to enhance photographs creatively and professionally with Photoshop CS3. If you are an aspiring professional, enthusiastic amateur photographer, or a student learning photography,...

Vector Basic Training: A Systematic Creative Process for Building Precision Vector Artwork
Vector Basic Training: A Systematic Creative Process for Building Precision Vector Artwork

The one question I get asked most by other creatives is, “How do you get your vector artwork to look so nice?” When people ask me this, they’re not talking about any specific art project or illustration, but rather how I go about building my artwork in vector format so precisely.

Truth is that many...

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

This book has been developed by and for security professionals who are dedicated to working in an ethical and responsible manner to improve the overall security posture of individuals, corporations, and nations.

THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS

Thwart malicious network intrusion...

The Mathematics of Coding Theory
The Mathematics of Coding Theory

This book is intended to be accessible to undergraduate students with two years of typical mathematics experience, most likely meaning calculus with a little linear algebra and differential equations. Thus, specifically, there is no assumption oLa background inabstr&;t algebra or number theory, nor of probability, nor of linear...

TortoiseSVN 1.7 Beginner's Guide
TortoiseSVN 1.7 Beginner's Guide

TortoiseSVN is a popular and easy-to-use Subversion client for Microsoft Windows. It is a Windows Shell extension, and is not limited to any particular IDE. TortoiseSVN is a free software which has been released under the GNU General Public License.

This book will help you to understand and use all of the features provided by...

IT Auditing Using Controls to Protect Information Assets, 2nd Edition
IT Auditing Using Controls to Protect Information Assets, 2nd Edition

When we began writing this book, we had a fundamental tenet: Write a clear handbook for creating the organization’s IT audit function and for performing their IT audits. We wanted this book to provide more than checklists and textbook theories but instead to provide real-life practical guidance from people who have performed IT...

Result Page: 181 180 179 178 177 176 175 174 173 172 171 170 169 168 167 166 165 164 163 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy