Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Photoshop CS3 Trickery & FX (Graphics Series)
Advanced Photoshop CS3 Trickery & FX (Graphics Series)
Advanced Photoshop CS3 Trickery & FX is a completely updated edition of this specialized book for Photoshop users wishing to go beyond the basics. It takes digital artists to the next level of creativity by teaching them how to blend their artistic talent seamlessly with the powerful tools of Photoshop CS3. The book is packed with full color...
Starting Out with Python (3rd Edition)
Starting Out with Python (3rd Edition)

 

Note: You are purchasing a standalone product; MyProgrammingLab does not come packaged with this content. If you would like to purchase both the physical text and MyProgrammingLab  search for ISBN-10: 0133862259/ISBN-13: 978013386225 . That package includes ISBN-10:...

Practical Android: 14 Complete Projects on Advanced Techniques and Approaches
Practical Android: 14 Complete Projects on Advanced Techniques and Approaches
Choose the best approach for your app and implement your solution quickly by leveraging complete projects. This book is a collection of practical projects that use advanced Android techniques and approaches, written by Android instructor Mark Wickham. Mark has taught a series of popular classes at Android development conferences...
Building Distributed Applications with Visual Basic.NET (White Book)
Building Distributed Applications with Visual Basic.NET (White Book)
Building Distributed Applications with Visual Basic.NET provides corporate developers with the .NET Framework techniques necessary to build distributed and reusable business systems in VB.NET. Covered topics include: VB.NET and the .NET Framework architecture and language concepts; building distributed applications with VB.NET using...
Hack I.T.: Security Through Penetration Testing
Hack I.T.: Security Through Penetration Testing
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
Fixed-Mobile Wireless Networks Convergence: Technologies, Solutions, Services
Fixed-Mobile Wireless Networks Convergence: Technologies, Solutions, Services
This practical book is for anyone who needs to understand the solutions that allow multimedia communications between mobile networks and fixed wireless communications. It presents the fundamentals of individual fixed and mobile wireless technologies in terms of architectures, standards, management capabilities and quality of service issues, is...
MySpace for Musicians
MySpace for Musicians
MySpace is one of the most popular websites on the Internet today, with millions of pages of user-generated content. This makes MySpace an ideal tool for musicians interested in promoting their music to the widest possible audience. Many acts have gone from the garage to a recording contract by using MySpace as their launching pad. MySpace for...
JavaScript by Example (2nd Edition)
JavaScript by Example (2nd Edition)

The World’s Easiest Java Script Tutorial–Fully Updated!

 

JavaScript by Example, Second Edition, is the easiest, most hands-on way to learn JavaScript. Legendary programming instructor Ellie Quigley has thoroughly...

Windows Forensics and Incident Recovery
Windows Forensics and Incident Recovery

If you're responsible for protecting Windows systems, firewalls and anti-virus aren't enough. You also need to master incident response, recovery, and auditing. Leading Windows security expert and instructor Harlan Carvey offers a start-to-finish guide to the subject: everything administrators must know to recognize ...

Sarbanes-Oxley Guide for Finance and Information Technology Professionals
Sarbanes-Oxley Guide for Finance and Information Technology Professionals

Sarbanes-Oxley and its international variants are here to stay.

Are you prepared for this new business reality?

Changing the landscape of corporate governance, financial disclosure, and the practice of public accounting, the Sarbanes-Oxley Act (SOX) can be confusing and complex for professionals and executives who must take...

ASP.NET MVC Framework Unleashed
ASP.NET MVC Framework Unleashed

In this book, world-renowned ASP.NET expert and member of the Microsoft ASP.NET team Stephen Walther shows experienced developers how to use Microsoft’s new ASP.NET MVC Framework to build web applications that are more powerful, flexible, testable, manageable, scalable, and extensible.

Guide to Computer Network Security (Computer Communications and Networks)
Guide to Computer Network Security (Computer Communications and Networks)
Contemporary societies have increasing dependence on computers and computer networks, and the increasing popularity of mobile computing, have given rise to numerous computer security problems. Yet despite a high proliferation of expert remedies, a viable and comprehensive solution to these security issues remains elusive, and society continues to...
unlimited object storage image
Result Page: 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy