Canon PowerShot G12: From Snapshots to Great Shots
Now that you’ve bought the amazing Canon PowerShot G12, you need a book that goes beyond a tour of the camera’s features to show you exactly how to use your camera to take great pictures. With...
16 Feb, 2011
Now that you’ve bought the amazing Canon PowerShot G12, you need a book that goes beyond a tour of the camera’s features to show you exactly how to use your camera to take great pictures. With...
16 Feb, 2011
Packed with insider tips and tricks, this how-to guide is fully revised to cover the latest version of Google Analytics and shows you how to implement proven Web analytics methods and concepts.This second edition of the...
16 Feb, 2011
Build robust Excel 2010 apps quickly and efficientlyKnown as “Mr. Spreadsheet,” John Walkenbach’s name is synonymous with excellence in computer books that explain the complexities of various topics. With this collection of favorite Excel tips and...
16 Feb, 2011
Search has changed everything. Search has become woven into our everyday lives, and permeates offline as well as online activities. Every business should have a search strategy. How a business appears online can impact consumer influence...
15 Feb, 2011
System Design for Telecommunication Gateways provides a thorough review of designing telecommunication network equipment based on the latest hardware designs and software methods available on the market. Focusing on high-end efficient designs that challenge all aspects...
15 Feb, 2011
Smashing Photoshop CS5 is loaded with 100 creative and innovative techniques to help jump-start your creativity and inspire you to do more with your designs and photographs. This book is aimed at designers, artists and photographers...
15 Feb, 2011
Object-Oriented Programming and Java presents two important topics in contemporary software development: object-oriented programming and Java. This book takes a different teaching approach from most available literature, it begins with the description of real-world object interaction...
15 Feb, 2011
THE LATEST STRATEGIES FOR UNCOVERING TODAY’S MOST DEVASTATING ATTACKS Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical...
15 Feb, 2011
Major enterprises and small start-ups are beginning to embrace cloud computing for the scalability and reliability that cloud vendors can provide. This book demonstrates how to implement robust and highly scalable cloud computing applications. Filled with...
15 Feb, 2011
As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applications, and information systems. In order to effectively protect this data against evolving...
More