Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Adobe Scripting: Your Visual Blueprint to Scripting in Photoshop and Illustrator
Adobe Scripting: Your Visual Blueprint to Scripting in Photoshop and Illustrator
Combining clear, step-by-step screen shots with minimal text, our five Visual series are the ultimate resources for visual learners, who represent up to forty percent of your customers.
Teach Yourself VISUALLY guides help computer users get up to speed on a wide range of office productivity, graphics, and Web design software. Offering
...
Practical Hacking Techniques and Countermeasures
Practical Hacking Techniques and Countermeasures
Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results.

It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to
...
Fashion Marketing
Fashion Marketing
‘Clothing that is not purchased or worn is not fashion’ (to paraphrase Armani)

Knowledge of marketing is essential to help ensure success and reduce the risk of failure in fashion. For the designer starting up in business, this book offers a guide to the major decisions that will enable you to fulfil...

An Introduction to the Physical Chemistry of Food (Food Science Text Series)
An Introduction to the Physical Chemistry of Food (Food Science Text Series)

Familiar combinations of ingredients and processing make the structures that give food its properties. For example in ice cream, the emulsifiers and proteins stabilize partly crystalline milk fat as an emulsion, freezing (crystallization) of some of the water gives the product its hardness and polysaccharide stabilizers keep it smooth. Why...

Network Security Assessment: From Vulnerability to Patch
Network Security Assessment: From Vulnerability to Patch
This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks.

This is unique in that it details both the management and technical skill and tools
...
Java Message Service API Tutorial and Reference: Messaging for the J2EE Platform
Java Message Service API Tutorial and Reference: Messaging for the J2EE Platform
Aimed at the more experienced Java developer who needs to work with enterprise messaging, Java Message Service API Tutorial and Reference delivers starter code and a complete reference to all JMS classes that you will need to know to work effectively with this powerful feature of the J2EE platform.

The no-nonsense, just-the-facts...

Complete Maya Programming, Vol. II: An In-Depth Guide to 3D Fundamentals, Geometry, and Modeling
Complete Maya Programming, Vol. II: An In-Depth Guide to 3D Fundamentals, Geometry, and Modeling
David Gould's acclaimed first book, Complete Maya Programming: An Extensive Guide to MEL and the C++ API, provides artists and programmers with a deep understanding of the way Maya works and how it can be enhanced and customized through programming. In his new book David offers a gentle, intuitive introduction to the core ideas of...
The Top Ten Algorithms in Data Mining
The Top Ten Algorithms in Data Mining

Identifying some of the most influential algorithms that are widely used in the data mining community, The Top Ten Algorithms in Data Mining provides a description of each algorithm, discusses its impact, and reviews current and future research. Thoroughly evaluated by independent reviewers, each chapter focuses on a...

Manage IT as a Business : How to Achieve Alignment and Add Value to the Company
Manage IT as a Business : How to Achieve Alignment and Add Value to the Company
Many IT projects fail to deliver the benefits to the business that they promised. This is despite the fact that IT managers and staff work hard to meet the needs of the business by putting systems into place and ensuring that network operations are reliable and stable. The cause of this problem is almost always a misalignment of IT within the...
Programming Windows Presentation Foundation
Programming Windows Presentation Foundation

Windows Presentation Foundation (WPF) (formerly known by its code name "Avalon") is a brand-new presentation framework for Windows XP and Windows Vista, the next version of the Windows client operating system. For developers, WPF is a cornucopia of new technologies, including a new graphics engine that supports 3-D...

The J2EE Tutorial
The J2EE Tutorial

You're familiar with Java™ programming, but now it's time for you to take it to the next level and begin creating enterprise applications with the Java™ 2 Platform, Enterprise Edition (J2EE™). The J2EE™ Tutorial is the hands-on, example-driven guide that offers unparalleled technical guidance...

Mobile Web Development
Mobile Web Development
This complete, practical guide to writing mobile websites and applications shows developers how to build a powerful mobile web presence. Readers need knowledge of HTML, CSS, JavaScript, and a server-side language; the examples use PHP, but are easily adapted to other languages. The book does not use J2ME, but uses mobiles' web browsers and other...
unlimited object storage image
Result Page: 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy