 |
|
|
|
 |  |  Mastering AutoCAD 2008 and AutoCAD LT 2008The World's Bestselling AutoCAD Resource Fully Updated for 2008
There's a reason why Mastering AutoCAD is so popular year after year. Loaded with concise explanations, step-by-step instructions, and hands-on projects, this comprehensive reference and tutorial from award-winning author George Omura has everything you... |  |  MP3: The Definitive GuideMP3, standing for MPEG-1, Layer 3, is a codec for compressing the size of audio files for digital distribution. Much more than a definition, MP3 is nothing less than a cultural and economic revolution on the Internet. Every day, hundreds of thousands of MP3 music files are searched for, shared, recorded and listened to by computer and Internet... |
|
|
 Professional Cooking, Trade Version—From the Foreword by André Cointreau President and CEO, Le Cordon Bleu
If you're serious about cooking, you'll want to join the hundreds of thousands of chefs who have used Wayne Gisslen's Professional Cooking to learn the basics of their craft. With more information and step-by-step photographs than ever before, the Sixth Edition... |  |  Building Cocoa Applications : A Step by Step GuideBuilding Cocoa Applications is an ideal book for serious developers who want to write programs for the Mac OS X using Cocoa. It's a no-nonsense, hands-on text that's filled with examples -- not only simple and self-contained examples of individual Cocoa features, but extended examples of complete applications with enough sophistication... |  |  Flash Application Design Solutions: The Flash Usability HandbookFlash Application Design Solutions shows you how to harness the power of ActionScript 2.0 and make the most of the improved design tools of Flash 8 to create usable, intuitive Flash interfaces. In this book, you'll find a number of concrete Flash usability solutions that use elements such as navigation menus, data filtering, forms,... |
|
 Stealing the Network: How to Own an IdentityThe first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.
In this third installment, the all-star cast of authors tackle one of the... |  |  |  |  |
|
|
Result Page: 79 78 77 76 75 74 73 72 71 70 |