Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Photoshop for the Web: Covers Photoshop 5.5 and ImageReady 2.0
Photoshop for the Web: Covers Photoshop 5.5 and ImageReady 2.0

In this second edition, author Mikkel Aaland updatesPhotoshop for the Web to include important new techniques and workarounds for the latest release of Photoshop--version 5.5. The first edition was loaded with step-by-step examples and real-world solutions from some of the world's hottest Web sites. The second edition adds...

Dissecting the Hack: The V3rb0t3n Network
Dissecting the Hack: The V3rb0t3n Network

Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will...

Cutaneous Lymphomas (Basic and Clinical Dermatology)
Cutaneous Lymphomas (Basic and Clinical Dermatology)

Based on extensive clinical, histological, and experimental studies, this guide serves as an authoritative source of information on the epidemiology, etiology, pathogenesis, diagnosis, and treatment of cutaneous lymphomas-reflecting the state-of-the-art in the field of cutaneous lymphomas-presented in the context of the brand-new...

A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)
A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)

“I have found this book to be a very useful classroom text, as well as a great Linux resource. It teaches Linux using a ground-up approach that gives students the chance to progress with their skills and grow into the Linux world. I have often pointed to this book when asked to recommend a solid...

Solar Energy: Systems, Challenges, and Opportunities (Energy, Environment, and Sustainability)
Solar Energy: Systems, Challenges, and Opportunities (Energy, Environment, and Sustainability)
This book covers challenges and opportunities related to solar-energy based systems. It covers a wide variety of topics related to solar energy, including  applications-based systems such as solar thermal systems that are focused on drying, desalination, space cooling, refrigeration, and processing; recent advances in solar cells (DSSC) and...
DK Eyewitness Lisbon (Travel Guide)
DK Eyewitness Lisbon (Travel Guide)
Discover Europe's capital of cool

Whether you want to explore the jumbled streets of Alfama, take in the fantastic views from Castelo de São Jorge, or simply sample the city's iconic custard tarts, your DK Eyewitness travel guide makes sure you experience all that Lisbon has to offer.

As one
...
The Waite Group's C Primer Plus
The Waite Group's C Primer Plus
The Waite Group’s C Primer Plus, Third Edition presents the ANSI C standard beginning with a discussion of the fundamentals of C programming and then continues on to illustrate real-world C programming concepts and techniques. The Waite Group’s C Primer Plus, Third Edition, is jam-packed with hundreds of...
Introduction to Computer Security
Introduction to Computer Security

In this authoritative book, widely respected practitioner and teacher Matt Bishop presents a clear and useful introduction to the art and science of information security. Bishop's insights and realistic examples will help any practitioner or student understand the crucial links between security theory and the day-to-day security...

Learning SQL on SQL Server 2005
Learning SQL on SQL Server 2005

Anyone who interacts with today's modern databases needs to know SQL (Structured Query Language), the standard language for generating, manipulating, and retrieving database information. In recent years, the dramatic rise in the popularity of relational databases and multi-user databases has fueled a healthy demand for...

Mac OS X 10.4 Tiger : Visual QuickStart Guide
Mac OS X 10.4 Tiger : Visual QuickStart Guide
So you're finally ready to find out what all the fuss is about. Whether you're switching from Windows or upgrading from an older Mac OS, this task-based guide represents the surest way to go from 0 to 60 in no time flat with Apple's much anticipated Mac OS X Tiger--more mature, powerfully enhanced, and with more than 200 new features that will...
Buffer Overflow Attacks
Buffer Overflow Attacks
Buffer overflows. In most information technology circles these days, the term buffer overflows has become synonymous with vulnerabilities or in some cases, exploits. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly, and have...
CISSP(r): Certified Information Systems Security Professional Study Guide, 2nd Edition
CISSP(r): Certified Information Systems Security Professional Study Guide, 2nd Edition
Here's the book you need to prepare for the challenging CISSP exam from (ISC)2. This revised edition was developed to meet the exacting requirements of today's security certification candidates. In addition to the consistent and accessible instructional approach that earned...
unlimited object storage image
Result Page: 946 945 944 943 942 941 940 939 938 937 936 935 934 933 932 931 930 929 928 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy