Home | Amazing | Today | Tags | Publishers | Years | Search 
DV Filmmaking: From Start to Finish : From Start to Finish
DV Filmmaking: From Start to Finish : From Start to Finish

DV Filmmaking: From Start to Finish covers all aspects of the new digital video frontier, for amateurs and professionals alike--from the nuts and bolts of timecode and aspect ratio; to framing, lighting, and sound recording; as well as editing, special effects creation, and...

What Are Syndication Feeds
What Are Syndication Feeds
When you enter the world of syndicated content, you're often faced with the question of what is the "proper" way to do syndication. While syndication feeds have become a standard tool on the Web--you've seen their signposts: a little orange button labeled XML in white letters, or maybe buttons that say Atom, RSS 2.0, RSS 1.0, or even...
Upgrading and Repairing Servers
Upgrading and Repairing Servers

Servers are the heart and soul of businesses today. Scott and Jarret tackle the confusing array of server design form factors, power supplies, rack mounts, dual processor setups, RAID, blade technology, InfiniBand, clustering, load balancing and replication. The authors address these topics from an OS-neutral standpoint, focusing solely on how...

Running Linux
Running Linux

You may be contemplating your first Linux installation. Or you may have been using Linux for years and need to know more about adding a network printer or setting up an FTP server. Running Linux, now in its fifth edition, is the book you'll want on hand in either case. Widely recognized in the...

Disassembling Code : IDA Pro and SoftICE
Disassembling Code : IDA Pro and SoftICE
Emphasizing the analysis of software code and identifying the main structure of languages in which they were written, this real-world text covers various aspects of disassembling, analyzing, and debugging software code.

This book describes how software code analysis tools such as IDA Pro are used to disassemble programs written in...

Apple Pro Training Series : Advanced Editing Techniques in Final Cut Pro 5
Apple Pro Training Series : Advanced Editing Techniques in Final Cut Pro 5
In the only Apple-certified guide to advanced video editing techniques, award-winning filmmaker Michael Wohl delivers comprehensive training in the real-world skills that professionals use every day. Working through six hours of superb raw footage on two DVD-9 discs, you'll learn to cut dialogue, action, comedy, chases, fights, interviews,...
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
I was sitting at my desk when my phone rang. I answered the phone and it was a
large pharmaceutical company who was interested in consulting services.They
started off the conversation stating that they had some problems and thought that
my company might be able to help.They had noticed a trend with one of their foreign...
Running Mac OS X Tiger (Animal Guide)
Running Mac OS X Tiger (Animal Guide)

Running Mac OS X Tiger is the ideal resource for power users and system administrators like you who want to tweak Tiger, the new release of Mac OS X, to run faster, better, or just differently.

If you areready to dig deep into your Mac, this book expertly guides you to the core of Mac OS X. It...

Skype Hacks: Tips & Tools for Cheap, Fun, Innovative Phone Service
Skype Hacks: Tips & Tools for Cheap, Fun, Innovative Phone Service

If you've heard about Skype--and who hasn't with all the recent media attention devoted to internet telephone services--chances are you've been mighty tempted to try it out. Skype Hacks tells you what all the Skype hype is about, explains the basics, and shows you more than 100 clever tips and...

Intelligent Document Retrieval: Exploiting Markup Structure
Intelligent Document Retrieval: Exploiting Markup Structure
Collections of digital documents can nowadays be found everywhere in institutions, universities or companies. Examples are Web sites or intranets. But searching them for information can still be painful. Searches often return either large numbers of matches or no suitable matches at all. Such document collections can vary a lot in size and how much...
Penetration Tester's Open Source Toolkit
Penetration Tester's Open Source Toolkit
This is the first fully integrated Penetration Testing book and bootable Linux CD containing the Auditor Security Collection which includes over 300 of the most effective and commonly used open source attack and penetration testing tools. This powerful tool kit and authoritative reference is written by the security industry's foremost...
Securing Im and P2P Applications for the Enterprise
Securing Im and P2P Applications for the Enterprise
Are You Ready for the Network Equivalent of Guerrilla Warfare?

Instant Messaging (IM) and Peer-to-Peer (P2P) applications are taking over the workplace as P2P transfers now account for 70% of all Internet traffic and more than 50% of corporate workstations are running an IM application. IT professionals face the challenge of...

Result Page: Previous 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy