|
|
|
|
Making a Movie in Premiere Elements : Visual QuickProject GuideSo you fancy yourself a filmmaker? Here to ensure that you truly are is a simple, to-the-point guide that leads you through the process of creating your very first digital video project with Adobe's brand-new consumer-level video editing software, Premiere Elements ($99). In these pages veteran author and PC... | | Professional Development with Web APIs : Google, eBay, Amazon.com, MapPoint, FedExProfessional Development with Web APIs
Web APIs are sets of application programming interfaces that allow programmers to write applications that use services offered by third parties. At long last, you can now integrate the power of Web APIs from leading technology companies such as Google, eBay, PayPal, Amazon, MapPoint, UPS, and FedEx in... | | Game Testing All in One (Game Development Series)Covering roles and duties of a game tester, this in-depth text reveals how to apply software test engineer methodologies to the game industry. You'll learn how to quickly produce useful test documents, capture important data, and analyze measurements.
Game Testing All in One reveals how to apply software test engineer... |
|
|
Protect Your Windows Network From Perimeter to DataIn this book, two senior members of Microsoft's Security and Business Technology Unit present a complete "Defense in Depth" model for protecting any Windows networkno matter how large or complex. Drawing on their work with hundreds of enterprise customers, they systematically address all three elements of a successful security... | | Beginning Regular Expressions (Programmer to Programmer)Regular expressions help users and developers to find and manipulate text more effectively and efficiently. In addition, regular expressions are supported by many scripting languages, programming languages, and databases. This example-rich tutorial helps debunk the traditional reputation of regular expressions as being cryptic. It explains the... | | Pro DNS and BINDEvery time you get e-mail, every time you access a web page, you use the Domain Name System (DNS). In fact, over 2 billion such requests hit the DNS root-servers alone every day. Every one of those 2 billion requests originate from a DNS that supports a group of local users, and every one of them is finally answered by a DNS server... |
|
SSH, the Secure Shell: The Definitive GuideAre you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every... | | | | |
|
|
Result Page: Previous 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 Next |