Here's how to take control of all your cool camera's features
Your Digital Rebel XSi/450D delivers an exciting new way to take pictures, and this book shows you how to make every shot a winner! Even if you have no clue what aperture, white balance, or ISO mean, you'll soon be switching easily between automatic and...
Utilize modern methods for digital image processing and take advantage of the many time-saving templates provided for all of the projects in this book.
Modern Algorithms for Image Processing approaches the topic of image processing through teaching by example. Throughout the book, you will create projects...
Whether you’re a professional photographer or the family shutterbug, you can’t afford to miss the third edition of the now classic Photoshop Restoration & Retouching. Katrin Eismann and co-author Wayne Palmer have reviewed, updated, and revised every single technique to address the most important features in Adobe Photoshop CS2....
Yusuf Bhaiji, CCIE No. 9305 (R&S and Security), has been with Cisco for seven years and is currently the program manager for Cisco CCIE Security certification. He is also the CCIE Proctor in the Cisco Dubai Lab. Prior to this, he was technical lead for the Sydney TAC Security and VPN team at Cisco.
Flash programmers have always enjoyed a freedom of expression unparalleled in other programming platforms. And with the release of AS3 and CS4, Adobe has propelled that freedom of expression into the third dimension.
But long before AS3, Flash developers were experimenting with 3D. And applications like Papervision3D formalized...
Meetings with Remarkable Men, G. I. Gurdjieff’s autobiographical account of his youth and early travels, has become something of a legend since it was first published in 1963. A compulsive Âread” in the tradition of adventure narratives, but suffused with Gurdjieff’s unique perspective on life, it is organized...
There are many ways that a potential attacker can intercept information, or learn more about the sender, as the information travels over a network. Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.
Why do people become extremists? What makes people become so dismissive of opposing views? Why is political and cultural polarization so pervasive in America? Why do groups of teenagers, investors, and corporations take unnecessary risks? What leads groups to engage in such destructive acts as terrorism and ethic cleansing?
Get tips and advice for taking better pictures with your digital camera from expert photographer Ken Milburn. Discover all the cool things you can do--like making panoramas, short movies, rapid shot sequences for Web animations, instant greeting cards (both in print and for the Web), restoring and retouching photos--and much more. ...
With checklists, forms, and unbeatable resources to help you succeed
The painless way to create a winning business plan!
If you're an entrepreneur with big ideas but no plan, this friendly guide is for you. Updated and revised to better meet your business needs, this business plan companion covers it all — from...
"Not only is this book thorough in covering the networking technologies and the applications of todays communications networks, it also guides you to comprehensive understanding of problems and solutions. This should be mandatory reading for every professional in our business." --Loa Andersson, TLA-group, IETF MPLS working group...
If you work in an office, you probably don’t lose much sleep worrying about whether your files are safe if your PC melts down. Company IT departments handle those things for business networks. But how about all those precious photos, address lists, the family genealogy, and everything else that lives on your home network? Windows Home Server...