Home | Amazing | Today | Tags | Publishers | Years | Search 
Google+ For Dummies
Google+ For Dummies
Chances are you’re one of the 750 million or so users of Facebook, or maybe you’ve tried Twitter or another social network. Google has responded to the lively interest in social networking with one of its own called Google+ (also known as “Google Plus” or even just “g+”), and Google+ is...
Handbook of Industrial and Hazardous Wastes Treatment
Handbook of Industrial and Hazardous Wastes Treatment
Environmental managers, engineers, and scientists who have had experience with industrial and hazardous waste management problems have noted the need for a handbook that is comprehensive in its scope, directly applicable to daily waste management problems of specific industries, and widely acceptable by practicing environmental...
Windows Phone 7.5 Data Cookbook
Windows Phone 7.5 Data Cookbook
Storing and manipulating data plays an important role in making any mobile phone effective in business applications or any other data-driven application. Windows Phone 7.5 Data Cookbook covers topics such as how to bind data easily using databinding techniques, how to save data in local storage for later retrieval, how to format XML for data...
Java Software Solutions: Foundations of Program Design, Update JavaPlace
Java Software Solutions: Foundations of Program Design, Update JavaPlace
This book is about writing well-designed software. To understand software, we must first have a fundamental understanding of its role in a computer system. Hardware and software cooperate in a computer system to accomplish complex tasks. The nature of that cooperation and the purpose of various hardware components are important...
SharePoint 2010 Business Intelligence 24-Hour Trainer (Wrox Programmer to Programmer)
SharePoint 2010 Business Intelligence 24-Hour Trainer (Wrox Programmer to Programmer)

IF YOU’VE PICKED UP THIS BOOK, SharePoint 2010 Business Intelligence 24-Hour Trainer, you’ve decided to jump into one of the most dynamic areas of Business Intelligence: the exciting visualizations,

collaboration, and data service capabilities built into SharePoint 2010 through its new service application
...
Working With Objects:The Ooram Software Engineering Method
Working With Objects:The Ooram Software Engineering Method
The book describes the principles behind an industrial approach to software production. We claim that the technological basis of industrial software production should be object orientation. A large part of the book is devoted to explaining all the different things you can do with objects; we will also match the different...
Algorithms and Complexity. Handbook of Theoretical Computer Science, Vol. A
Algorithms and Complexity. Handbook of Theoretical Computer Science, Vol. A
Modern developments in computer and software systems have raised many challeng ing issues concerning the design and efficiency of complex programming applica tions. There is an increasing need for "advanced theory", to understand and exploit basic concepts and mechanisms in computing and information processing. The...
What's New in Adobe AIR 3
What's New in Adobe AIR 3
This book will detail the various enhancements, new functionalities, and general improvements available in this version of the Adobe AIR runtime. Each item is explained in detail, and when possible, a series of screen captures and a full code example will be provided, enabling you to both grasp the new feature in a visual way, and...
TCP/IP Illustrated, Volume 1: The Protocols (2nd Edition) (Addison-Wesley Professional Computing Series)
TCP/IP Illustrated, Volume 1: The Protocols (2nd Edition) (Addison-Wesley Professional Computing Series)

“For an engineer determined to refine and secure Internet operation or to explore alternative solutions to persistent problems, the insights provided by this book will be invaluable.”

—Vint Cerf, Internet pioneer

 

...
Wireless Crime and Forensic Investigation
Wireless Crime and Forensic Investigation

Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the...

Fundamentals of ActionScript 3.0: Develop and Design
Fundamentals of ActionScript 3.0: Develop and Design

Welcome to ActionScript. Over the next several chapters, you’ll be introduced to one of the most versatile programming languages to create web applications for the browser, desktop applications, and mobile apps for multiple platforms. For years the Flash Platform has provided people with the most powerful set of...

Photoshop Compositing Secrets: Unlocking the Key to Perfect Selections and Amazing Photoshop Effects for Totally Realistic Composites
Photoshop Compositing Secrets: Unlocking the Key to Perfect Selections and Amazing Photoshop Effects for Totally Realistic Composites

 

Photoshop compositing has really blown up over the last few years. You see composites everywhere from magazine ads and covers, to movie posters, to athletic portraits, to, well, just about any kind of portrait. It really is everywhere. Clients and customers are very aware of Photoshop now and
...
Result Page: 463 462 461 460 459 458 457 456 455 454 453 452 451 450 449 448 447 446 445 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy