Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Photoshop for the Web: Covers Photoshop 5.5 and ImageReady 2.0
Photoshop for the Web: Covers Photoshop 5.5 and ImageReady 2.0

In this second edition, author Mikkel Aaland updatesPhotoshop for the Web to include important new techniques and workarounds for the latest release of Photoshop--version 5.5. The first edition was loaded with step-by-step examples and real-world solutions from some of the world's hottest Web sites. The second edition adds...

Ruby Cookbook: Recipes for Object-Oriented Scripting
Ruby Cookbook: Recipes for Object-Oriented Scripting

Why spend time on coding problems that others have already solved when you could be making real progress on your Ruby project? This updated cookbook provides more than 350 recipes for solving common problems, on topics ranging from basic data structures, classes, and objects, to web development, distributed programming, and...

Living the Brand: How to Transform Every Member of Your Organization Into a Brand Champion
Living the Brand: How to Transform Every Member of Your Organization Into a Brand Champion
A company's workforce is its most valuable asset. It is the employees who translate an organization's strategy into reality, interact with consumers, and determine the corporate brand. This updated edition of Living the Brand demonstrates how a participatory approach can enhance employee commitment, improve service standards, and focus...
Learning Ext JS 4
Learning Ext JS 4

For those with a little JavaScript experience, this book is a great way to learn Ext JS and start building interactive web applications using Ajax, DHTML, Dom, and the like. Ideal for beginners.

  • Learn the basics and create your first classes
  • Handle data and understand the way it works, create powerful...
AWS Certified Advanced Networking Official Study Guide: Specialty Exam
AWS Certified Advanced Networking Official Study Guide: Specialty Exam

The official study guide for the AWS certification specialty exam

The AWS Certified Advanced Networking Official Study Guide – Specialty Exam helps to ensure your preparation for the AWS Certified Advanced Networking – Specialty Exam. Expert review of AWS fundamentals align with the exam objectives,...

A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)
A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)

“I have found this book to be a very useful classroom text, as well as a great Linux resource. It teaches Linux using a ground-up approach that gives students the chance to progress with their skills and grow into the Linux world. I have often pointed to this book when asked to recommend a solid...

Data Mining Tools for Malware Detection
Data Mining Tools for Malware Detection

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop...

BusinessObjects: The Complete Reference
BusinessObjects: The Complete Reference

Improve profitability and operations in your company by leveraging BusinessObjects with help from this comprehensive guidebook. Divided into three digestible sections, Business Objects: The Complete Reference will help you get fully acquainted with this sophisticated tool set, design and build a user-friendly interface, then reap...

Black Art of Java Game Programming
Black Art of Java Game Programming
Gaming on the Web is the next blockbuster business. Have any doubts? The video game industry,
which already eclipses Hollywood in terms of revenue, targets the Web as the next huge growth area.
Software developers are busily porting games to the online environment, or developing entirely new
ones. And numerous popular Web sites, many
...
Buffer Overflow Attacks
Buffer Overflow Attacks
Buffer overflows. In most information technology circles these days, the term buffer overflows has become synonymous with vulnerabilities or in some cases, exploits. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly, and have...
Data Compression: The Complete Reference
Data Compression: The Complete Reference
Giambattista della Porta, a Renaissance scientist, was the author in 1558 of Magia Naturalis (Natural Magic), a book in which he discusses many subjects, including demonology, magnetism, and the camera obscura. The book mentions an imaginary device that has since become known as the “sympathetic telegraph.” This device was to have...
Resource Management in Wireless Networking
Resource Management in Wireless Networking

This is the first book that provides readers with a deep technical overview of recent advances in resource management for wireless networks at different layers of the protocol stack. The subject is explored in various wireless networks, such as ad hoc wireless networks, 3G/4G cellular, IEEE 802.11, and Bluetooth personal area networks.

...
unlimited object storage image
Result Page: 872 871 870 869 868 867 866 865 864 863 862 861 860 859 858 857 856 855 854 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy