 |
|
 Photoshop Down & Dirty Tricks for Designers
Corey Barker, Executive Producer of PlanetPhotoshop.com and one of the Photoshop Guys of Photoshop User TV, brings you this handy and inspiring volume in the Down & Dirty Tricks series. Yes, this book is an insane collection of some of the most mind-blowing Photoshop effects you’ve ever seen in one place. Ever wonder how that movie... |  |  Encyclopedia of Parallel Computing (Springer Reference)
Parallelism, the capability of a computer to execute operations concurrently, has been a constant throughout the
history of computing. It impacts hardware, software, theory, and applications. The fastest machines of the past few
decades, the supercomputers, owe their performance advantage to parallelism. Today, physical limitations... |  |  IT Audit, Control, and Security (Wiley Corporate F&A)
WELCOME TO THE WORLD of IT Audit, Control, and Security. Much has
changed in information technology (IT) auditing since we published our
first edition of this book when we were then called Computer Auditors. Back
in those days, traditional mainframe or legacy computer systems were still common, we
had difficulty envisioning... |
|
|
|
 The Linux Command Line: A Complete Introduction
You've experienced the shiny, point-and-click surface of your Linux computer—now dive below and explore its depths with the power of the command line.
The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell. Along the way... |  |  Utilizing Information Technology Systems Across Disciplines: Advancements in the Application of Computer Science (Premier Reference Source)
In the information technology age coupled with computer advances, information systems have become an
integral part of many disciplines; accordingly, business, marketing, medicine, communication, banking,
geography, physics, chemistry, aviation, pilots, forensics, agriculture, and even traf.c lights have one
thing in common called... |  |  Inside Cyber Warfare: Mapping the Cyber Underworld
I was recently invited to participate in a cyber security dinner discussion by a few
members of a well-known Washington, DC, think tank. The idea was that we could
enjoy a fine wine and a delicious meal while allowing our hosts to pick our brains about
this “cyber warfare stuff.” It seems that the new ... |
|
Result Page: 925 924 923 922 921 920 919 918 917 916 915 914 913 912 911 910 909 908 907 |