Home | Amazing | Today | Tags | Publishers | Years | Search 
Learning Flex 4: Getting Up to Speed with Rich Internet Application Design and Development (Adobe Dev Lib)
Learning Flex 4: Getting Up to Speed with Rich Internet Application Design and Development (Adobe Dev Lib)

Learn Adobe Flex 4 in a fun and engaging way with this book's unique, hands-on approach. Using clear examples and step-by-step coaching from two experts, you'll create four applications that demonstrate fundamental Flex programming concepts.

Throughout the course of this book, you’ll learn how to enhance...

Blender 2.5 Lighting and Rendering
Blender 2.5 Lighting and Rendering

Each chapter develops a different aspect of a Blender technique. The book is essentially a step-by-step tutorial, which builds up your knowledge throughout. It has practical examples such as lighting a tricycle in open space, lighting a wine bottle on a table, and lighting a room that has a lamp as well as sunlight coming in through the...

Microsoft Office 2010 In Depth
Microsoft Office 2010 In Depth

Congratulations! You are about to harness the incredible capabilities of the latest version of Microsoft Office: Office 2010. Microsoft Office has been the gold standard for application suites for many years and provides all the applications that you need for a wide variety of tasks. Whether you are writing a novel, balancing your budget,...

C# Programming Language (Covering C# 4.0), The (4th Edition)
C# Programming Language (Covering C# 4.0), The (4th Edition)

The popular C# programming language combines the high productivity of rapid application development languages with the raw power of C and C++. Updated to cover the new features of C# 4.0, including dynamic binding, named and optional parameters, and covariant and contravariant generic types, this release takes the language...

Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)

Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.

The Information Security...

Digital Collage and Painting, Second Edition: Using Photoshop and Painter to Create Fine Art
Digital Collage and Painting, Second Edition: Using Photoshop and Painter to Create Fine Art

If you already know your way around Photoshop and Painter and want to use these amazing programs to take your skills further, this book is for you! Much more than a simple "how-to" guide, Susan Ruddick Bloom takes you on a full-fledged journey of the imagination and shows you how to create incredible works of fine art. Supplemented...

Doing Bayesian Data Analysis: A Tutorial with R and BUGS
Doing Bayesian Data Analysis: A Tutorial with R and BUGS

There is an explosion of interest in Bayesian statistics, primarily because recently created computational methods have finally made Bayesian analysis tractable and accessible to a wide audience. Doing Bayesian Data Analysis, A Tutorial Introduction with R and BUGS, is for first year graduate students or advanced undergraduates and provides...

Boundary Spanning Leadership: Six Practices for Solving Problems, Driving Innovation, and Transforming Organizations (Management & Leadership)
Boundary Spanning Leadership: Six Practices for Solving Problems, Driving Innovation, and Transforming Organizations (Management & Leadership)

PRAISE FOR BOUNDARY SPANNING LEADERSHIP

"Fostering a culture of teamwork among business units and partners is crucial for bottom-line success. This groundbreaking book, packed with practical examples and based on solid research, shows us how to get started." -- Marc Noel, Chairman, Noël Group LLC

...
Essential Numerical Computer Methods (Reliable Lab Solutions)
Essential Numerical Computer Methods (Reliable Lab Solutions)

The use of computers and computational methods has become ubiquitous in biological and biomedical research. During the last 2 decades most basic algorithms have not changed, but what has is the huge increase in computer speed and ease of use, along with the corresponding orders of magnitude decrease in cost.

A general perception...

Practical Signcryption (Information Security and Cryptography)
Practical Signcryption (Information Security and Cryptography)

In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives...

Selenium 1.0 Testing Tools: Beginners Guide
Selenium 1.0 Testing Tools: Beginners Guide

The Selenium 1.0 Testing Tools Beginner's guide shows developers and testers how to create automated tests using a browser. You'll be able to create tests using Selenium IDE, Selenium Remote Control and Selenium 2 as well. A chapter is completely dedicated to Selenium 2. We will then see how our tests use element locators such as CSS,...

Python Text Processing with NLTK 2.0 Cookbook
Python Text Processing with NLTK 2.0 Cookbook

Natural Language Processing is used everywhere - in search engines, spell checkers, mobile phones, computer games - even your washing machine. Python's Natural Language Toolkit (NTLK) suite of libraries has rapidly emerged as one of the most efficient tools for Natural Language Processing. You want to employ nothing less than the best...

Result Page: Previous 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy