Home | Amazing | Today | Tags | Publishers | Years | Search 
Network Defense: Perimeter Defense Mechanisms
Network Defense: Perimeter Defense Mechanisms

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Light It, Shoot It, Retouch It: Learn Step by Step How to Go from Empty Studio to Finished Image (Voices That Matter)
Light It, Shoot It, Retouch It: Learn Step by Step How to Go from Empty Studio to Finished Image (Voices That Matter)
FOR THE FIRST TIME EVER, YOU’LL LEARN ALL THREE ASPECTS OF WHAT IT TAKES TO CREATE STUNNING PORTRAITS
(HINT: IT’S NOT JUST THE LIGHTING)

Scott Kelby, the world’s #1 best-selling author of photography books, Editor-in-Chief and Publisher of Photoshop User...

The Tangled Web: A Guide to Securing Modern Web Applications
The Tangled Web: A Guide to Securing Modern Web Applications
Just fifteen years ago, the Web was as simple as it was unimportant: a quirky mechanism that allowed a handful of students, plus a bunch of asocial, basementdwelling geeks, to visit each other’s home pages dedicated to science, pets, or poetry. Today, it is the platform of choice for writing...
LEGO MINDSTORMS NXT: Mars Base Command (Technology in Action)
LEGO MINDSTORMS NXT: Mars Base Command (Technology in Action)

Congratulations! You’re on Mars Base Alpha, the first human outpost on the red planet. Don’t relax, though. It’s not all roses and unicorns up here. Mars isn’t called "The Bringer of War" for nothing! You’ve just been rained on by a meteor shower and it’s up to you—you!—to put your...

Microsoft Silverlight 5 Building Rich Enterprise Dashboards
Microsoft Silverlight 5 Building Rich Enterprise Dashboards
Welcome, to the exciting world of building Rich Enterprise Dashboards with Silverlight. Throughout this book, you will learn how to harness the power of the Silverlight 5.0 platform to build amazing Dashboards. This book goes beyond just showing the nuts and bolts of learning Silverlight and showcases how to create amazing...
Windows Azure Platform
Windows Azure Platform
In the past couple of years, cloud computing has emerged as a disruptive force in the information technology (IT) industry. Its impact is of the same magnitude as the Internet and offshoring. Gartner Research has identified cloud computing as one of the “top 10 disruptive technologies 2008–2012.” According to...
Filtering, Segmentation and Depth (Lecture Notes in Computer Science)
Filtering, Segmentation and Depth (Lecture Notes in Computer Science)

Computer vision seeks a process that starts with a noisy, ambiguous signal from a TV camera and ends with a high-level description of discrete objects located in 3-dimensional space and identified in a human classification. In this book we address this process at several levels. We first treat the low-level image-processing issues of...

Captured by the Light: The Essential Guide to Creating Extraordinary Wedding Photography
Captured by the Light: The Essential Guide to Creating Extraordinary Wedding Photography

IMAGINE THE ADVANTAGE YOU’D HAVE IF ONE OF THE WORLD’S TOP WEDDING SHOOTERS SHARED HIS SECRETS WITH YOU World-renowned wedding photographer, and one of the most widely acclaimed instructors in the industry today, David Ziser brings his no-nonsense, straight-to-the-point teaching style to a book that totally rewrites...

Nagios: System and Network Monitoring
Nagios: System and Network Monitoring

Good system administrators recognize problems long before anyone asks, "Hey, is the Internet down?" Nagios, an open source system and network monitoring tool, has emerged as the most popular solution for sys admins in organizations of all sizes. It's robust but also complex, and Nagios: System and Network Monitoring, 2nd...

Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Penetration testers are faced with a combination of firewalls, intrusion detection systems, host-based protection, hardened systems, and teams of knowledgeable analysts that pour over data collected by their security information management systems. In an environment such as this, simply running automated tools will typically...
Windows Azure Step by Step
Windows Azure Step by Step

Windows Azure is the Microsoft cloud computing platform that lets developers leverage its powerful, scalable, and fault-tolerant infrastructure to build successful applications.

Windows Azure Step by Step provides an organized walkthrough of the Windows Azure platform and its related technologies. The text is...

Google App Inventor
Google App Inventor

Google App Inventor is from the Internet giant Google, home of the famous search engine. Google also develops the Android operating system found on smartphones and tablet computers from many manufacturers including HTC, Motorola, Samsung, and a growing host of others.

In late breaking news as this book goes to press, Google and...

Result Page: 63 62 61 60 59 58 57 56 55 54 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy