 |
|
|
|
 HDR Photography Photo Workshop (Wiley's Photo Workshop Series)Expand your artistic vision with HDR photography
By artfully blending multiple exposures, you can create images with incredible detail, photos that mimic fine paintings, surrealistic imagery — once you understand the process, your options are virtually endless. This book explains the tools you need to get started and how to create... |  |  Nanocomputers and Swarm Intelligence“We need men who can dream of things that never were.” It is this sentence spoken by John Fitzgerald Kennedy in 1963 which has undoubtedly influenced my industrial career. Whether it be everyday electronics for the general public, or the components industry or even the world of video and imagery, the technological innovations which... |  |  Say It Like Obama and WIN!: The Power of Speaking with Purpose and VisionA fully updated, expanded edition of the leadership classic!
President Barack Obama never fails to fire up a crowd. Whether he’s addressing societal injustices or explaining complex policy decisions, Obama gains legions of enthusiastic supporters with every speech he makes.
With Say it Like Obama and Win!, you... |
|
 Google (Corporations That Changed the World)
It's the American dream—start a company, make a fortune, and retire early. But to become multimillionaires in their twenties, as Google founders Larry Page and Sergey Brin did, boggles the mind. All they did, after all, is come up with a better way to search for things on the Internet, right? Only in part. No company achieves a... |  |  Photoshop CS5 Trickery & FX
As a digital artist, you have the advantage of being able to combine all of the creative art forms using your medium--the computer. Photoshop CS5 Trickery & FX shows you how to take your creativity and your art to a new level by blending your traditional artistic skills and vision with the powerful tools of Adobe Photoshop CS5. Photoshop... |  |  Unauthorised Access: Physical Penetration Testing For IT Security Teams
The first guide to planning and performing a physical penetration test on your computer's security
Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application... |
|
Result Page: 10 9 8 7 6 5 4 3 2 1 |