Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Photoshop CS6 and Lightroom 4: A Photographer's Handbook
Photoshop CS6 and Lightroom 4: A Photographer's Handbook

Adobe Photoshop is central to almost all photography workflows and Lightroom has rapidly been adopted as well. Each new version of the software is a milestone in the development of these vital imaging tools, and the 2012 releases are no exception.

Photographers often feel overwhelmed when starting with Photoshop;
...

Beginning Microsoft SQL Server 2012 Programming
Beginning Microsoft SQL Server 2012 Programming
OUT OF EVERY ENDING COMES the beginning of something new. This title has been Rob Vieira’s for many years, and now he’s wrapping up that chapter of his life while I begin a new chapter of my own — and the fi rst chapter of this text. Likewise, you, as a reader, are also entering something of a transition; you know...
Electronic Resource Management in Libraries: Research and Practice (Premier Reference Source)
Electronic Resource Management in Libraries: Research and Practice (Premier Reference Source)
A pronounced move from print subscriptions to electronic resources in all types of libraries has fundamentally impacted the library and its users. With the influx of resources such as e-journals; e-books; index, abstract, and/or full-text databases; aggregated databases; and others, the shift to electronic resources is rapidly changing library...
Global Software and IT: A Guide to Distributed Development, Projects, and Outsourcing
Global Software and IT: A Guide to Distributed Development, Projects, and Outsourcing

Ongoing economic challenges are affecting and impacting business and society in nearly every industry and geographical region. Taking decisive action to reprioritize the way we are doing business is a key focus for companies. Around the world, companies are taking the necessary measures that will enable us to adjust to today’s reality...

Hadoop Operations
Hadoop Operations
Over the past few years, there has been a fundamental shift in data storage, management, and processing. Companies are storing more data from more sources in more formats than ever before. This isn’t just about being a “data packrat” but rather building products, features, and intelligence predicated on knowing more about...
Popular Culture and the State in East and Southeast Asia (Routledge Studies in Asia's Transformations)
Popular Culture and the State in East and Southeast Asia (Routledge Studies in Asia's Transformations)

This volume examines the relations between popular culture production and export and the state in East and Southeast Asia including the urban centres and middle-classes of Taiwan, South Korea, Japan, Singapore, Indonesia, Malaysia, China, Thailand, and the Philippines. It addresses the shift in official thinking toward the role of popular...

Microsoft Visual Basic .NET 2003 Kick Start
Microsoft Visual Basic .NET 2003 Kick Start

Visual Basic has slowly evolved over the years, incorporating a variety of features and moving itself into the world of "enterprise" development, but everything was being built on top of an already existing foundation. This is not unusual; most development tools progress in this way, but it has the unfortunate side...

A Practical Guide to Planning for E-Business Success:  How to E-enable Your Enterprise
A Practical Guide to Planning for E-Business Success: How to E-enable Your Enterprise
The Internet has had, and will continue to have, a major impact on our lives and businesses. It changes everything. The Internet provides a means to transform entire industries, create new industries, challenge industry leaders, and enable business in entirely new ways. Companies use the Internet to expand their markets, increase revenue,...
Hacking Exposed 7: Network Security Secrets and Solutions
Hacking Exposed 7: Network Security Secrets and Solutions

The latest tactics for thwarting digital attacks

“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the...

Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations
Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations
Become an effective cyber forensics investigator and gain a collection of practical, efficient techniques to get the job done. Diving straight into a discussion of anti-forensic techniques, this book shows you the many ways to effectively detect them. Now that you know what you are looking for, you’ll shift your focus to...
Encyclopedia of Cybercrime
Encyclopedia of Cybercrime
The first comprehensive encyclopedia to examine all aspects of the mysterious world of cybercrime

There are today no more compelling sets of crime and security threats facing nations, communities, organizations, groups, families and individuals than those encompassed by cybercrime. For over fifty years crime enabled by computing and
...
Management Strategies for the Cloud Revolution
Management Strategies for the Cloud Revolution

Increase efficiency while saving money with “on-demand” computing

The biggest game-changing force in business since the creation of the Internet, cloud computing simplifies and lowers the cost of operations while providing flexibility and power you never dreamed possible. Make your strategic move now, with...

unlimited object storage image
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy