|
|
|
|
iPhone SDK Programming, A Beginner's GuideDevelop your own iPhone applications
Ideal for non-Mac programmers, this introductory guide shows developers how to create applications for the world's most popular smart phone. You will learn how to use a modified version of the Mac development environment, the Objective-C programming ... | | The Photoshop Darkroom 2: Creative Digital Transformations
Back in the old days, working in a chemical
darkroom, I could only have dreamed of a postprocessing
tool as wonderful as Photoshop. But
for me that’s exactly what Photoshop is—a tool.
It’s a tool that helps me as a professional image
creator. The image is what matters, not the tool.
The Photoshop... | | Computability and Complexity Theory (Texts in Computer Science)
This revised and extensively expanded edition of Computability and Complexity Theory comprises essential materials that are core knowledge in the theory of computation. The book is self-contained, with a preliminary chapter describing key mathematical concepts and notations. Subsequent chapters move from the qualitative aspects of... |
|
|
|
Outsider Art: From the Margins to the Marketplace
The term outsider art has been used to describe work produced exterior to the mainstream of modern art by certain self-taught visionaries, spiritualists, eccentrics, recluses, psychiatric patients, criminals, and others beyond the perceived margins of society. Yet the idea of such a raw, untaught creativity remains a... | | Work (The Art of Living Series)
Work is one of the most universal features of human life; virtually everybody spends some part of their life at work. It is often associated with tedium and boredom; in conflict with the things we would otherwise love to do. Thinking of work primarily as a burden - an activity we would rather be without - is a thought that was shared by the... | | Aggressive Network Self-DefenseI'm Mad As Hell, and I'm Not Gonna Take it Anymore!
- Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
- Follow the travails of eight system administrators who take cyber law into their own hands.
... |
|
|
Result Page: 217 216 215 214 213 212 211 210 209 208 207 206 |