Home | Amazing | Today | Tags | Publishers | Years | Search 
Portraiture Unplugged: Natural Light Photography
Portraiture Unplugged: Natural Light Photography
Good lighting is everything in portraiture. The right light sculpts our subjects, smooths the skin, evens skin tones, and helps create the feeling of a third dimension in a two-dimensional image. The gold standard of lighting has, for the better part of a century, been produced by artificial lights (hot lights or strobes) in the studio....
From Photon to Pixel: The Digital Camera Handbook
From Photon to Pixel: The Digital Camera Handbook

The digital camera conceals remarkable technological innovations that affect the formation of the image, the color representation or automated measurements and settings.

** From photon to pixel photon ** describes the device both from the point of view of the physics of the phenomena involved, as technical components and software...

Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

Spring in Practice: Covers Spring 3
Spring in Practice: Covers Spring 3

Summary

Spring in Practice shows you how to tackle the challenges you face when you build Spring-based applications. The book empowers software developers to solve concrete business problems by mapping application-level issues to Spring-centric solutions. It diverges from other cookbooks because it presents...

Learn Adobe Photoshop CC for Visual Communication: Adobe Certified Associate Exam Preparation (Adobe Certified Associate (ACA))
Learn Adobe Photoshop CC for Visual Communication: Adobe Certified Associate Exam Preparation (Adobe Certified Associate (ACA))

As the most popular image-editing application on the market today, Adobe Photoshop is an indispensable part of any creative designer's toolkit. Mastering Photoshop for photo retouching or general design work should be the first step on your path to a career in the visual design field. Learn Adobe Photoshop CC by building cool creative...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Intro to Java Programming, Comprehensive Version (10th Edition)
Magic For Dummies
Magic For Dummies

You don’t need a white tiger, expensive props, or hours of preparation to do magic. With a little practice, some clever misdirection (which lays at the heart of all magic tricks), and showmanship, you can surprise family, friends, and coworkers using a few everyday items!

If you’re looking to saw a beautiful women in...

Hands-On Machine Learning with Scikit-Learn and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems
Hands-On Machine Learning with Scikit-Learn and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems

Graphics in this book are printed in black and white.

Through a series of recent breakthroughs, deep learning has boosted the entire field of machine learning. Now, even programmers who know close to nothing about this technology can use simple, efficient tools to implement programs capable of learning from data....

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Book of the Moon: A Guide to Our Closest Neighbor
Book of the Moon: A Guide to Our Closest Neighbor
Have you ever wondered if there are seasons on the moon or if space tourism will ever become commonplace? So has Dr. Maggie Aderin-Pocock. In fact, she earned her nickname “Lunatic” because of her deep fascination for all things lunar. In her lucidly written, comprehensive guide to the moon, Aderin-Pocock takes readers...
I Am Cyrus: Harry S. Truman and the Rebirth of Israel
I Am Cyrus: Harry S. Truman and the Rebirth of Israel

2020 Selah Award Winner

Improbable, if not impossible. How could a people who’d been scattered for two millennia reestablish a homeland on their ancient soil?

Against all odds, an irresistible desire to return grew in courageous Jewish men and women who set out to rebuild their...

Result Page: 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy