|
|
|
|
Photoshop for the Web: Covers Photoshop 5.5 and ImageReady 2.0
In this second edition, author Mikkel Aaland updatesPhotoshop for the Web to include important new techniques and workarounds for the latest release of Photoshop--version 5.5. The first edition was loaded with step-by-step examples and real-world solutions from some of the world's hottest Web sites. The second edition adds... | | Dissecting the Hack: The V3rb0t3n Network
Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will... | | Cutaneous Lymphomas (Basic and Clinical Dermatology)
Based on extensive clinical, histological, and experimental studies, this guide serves as an authoritative source of information on the epidemiology, etiology, pathogenesis, diagnosis, and treatment of cutaneous lymphomas-reflecting the state-of-the-art in the field of cutaneous lymphomas-presented in the context of the brand-new... |
|
A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)
“I have found this book to be a very useful classroom text, as well as a great Linux resource. It teaches Linux using a ground-up approach that gives students the chance to progress with their skills and grow into the Linux world. I have often pointed to this book when asked to recommend a solid ... | | | | DK Eyewitness Lisbon (Travel Guide)
Discover Europe's capital of cool
Whether you want to explore the jumbled streets of Alfama, take in the fantastic views from Castelo de São Jorge, or simply sample the city's iconic custard tarts, your DK Eyewitness travel guide makes sure you experience all that Lisbon has to offer.
As one ... |
|
|
Mac OS X 10.4 Tiger : Visual QuickStart GuideSo you're finally ready to find out what all the fuss is about. Whether you're switching from Windows or upgrading from an older Mac OS, this task-based guide represents the surest way to go from 0 to 60 in no time flat with Apple's much anticipated Mac OS X Tiger--more mature, powerfully enhanced, and with more than 200 new features that will... | | Buffer Overflow AttacksBuffer overflows. In most information technology circles these days, the term buffer overflows has become synonymous with vulnerabilities or in some cases, exploits. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly, and have... | | |
|
|
Result Page: 946 945 944 943 942 941 940 939 938 937 936 935 934 933 932 931 930 929 928 |