|
|
Getting Started with Grunt: The JavaScript Task Runner
A hands-on approach to mastering the fundamentals of Grunt
Overview
-
Gain insight on the core concepts of Grunt, Node.js and npm to get started with Grunt.
-
Learn how to install, configure, run, and customize Grunt
-
Example-driven and filled with tips to help you create custom...
| | Sketchbook Pro Digital Painting Essentials
Create stunning professional grade artwork using Sketchbook Pro
Overview
-
Discover tricks and techniques that will help you make the most out of Sketchbook Pro
-
Packed with practical examples that help you create expressive sketches ranging from cartoons to portraits
-
A...
| | Anatomy and Human Movement: Structure and function with PAGEBURST Access, 6e
Printed book plus PageburstT access - you will receive a printed book and access to the complete book content electronically. PageburstT enhances learning by not only bringing world class content to your fingertips but also letting you add to it, annotate it, and categorize it all in a way that suits you. PageburstT frees you to spend more... |
|
|
|
Advanced Nutrition and Human Metabolism
Current, comprehensive, and designed to maximize clarity of the concepts you need to know, longtime best seller ADVANCED NUTRITION AND HUMAN METABOLISM, SIXTH EDITION delivers its signature quality content in a student-friendly presentation. This text is accessible, with relevant examples, illustrations, applications, tables, and figures to... | | Learning Perforce SCM
A comprehensive guide to the world's leading enterprise configuration management system
Overview
-
Master the use of P4V - the Perforce Visual Client
-
Get into the Perforce mindset for seamless use in your daily work
-
Grasp key concepts and learn how to apply them for proper...
| | Modern Cryptography Primer: Theoretical Foundations and Practical Applications
Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these... |
|
Result Page: 2372 2371 2370 2369 2368 2367 2366 2365 2364 2363 2362 2361 2360 2359 2358 2357 2356 2355 2354 |