eBooks-it.org Logo
eBooks-IT.org Inner Image

No Starch eBooks Page 17

Download free No Starch eBooks Page 17

The Artist's Guide to GIMP

Creative Techniques for Photographers, Artists, and Designers
The Artist's Guide to GIMP Image
2nd Edition
As a full-featured, free alternative to Adobe Photoshop, GIMP is one of the world's most popular open source projects. The latest version of GIMP (2.8) brings long-awaited improvements and powerful new tools to make graphic design and photo manipulation even easierbut it's still a notoriously challenging program to use.The Artist's Guide to GIMP teaches you how to use GIMP without a tedious list of menu paths and options. Instead, as you follow along with Michael J. Hammel's step-by-step instructions, you'll learn to produce professional-looking advertisements, apply impressive photographic effects, and design cool logos and text effects. These extensi...

The Art of Assembly Language

The Art of Assembly Language Image
Presents assembly language from the high-level programmer's point of view, so you can start writing meaningful programs within days. The High Level Assembler (HLA) that accompanies the book is the first assembler that allows you to write portable assembly language programs that run under either Linux or Windows with nothing more than a recompile. The CD-ROM includes the HLA and the HLA Standard Library, all the source code from the book, and over 50,000 lines of additional sample code, all well-documented and tested. The code compiles and runs as-is under Windows and Linux....

Steal This File Sharing Book

What They Won't Tell You About File Sharing
Steal This File Sharing Book Image
Steal This File Sharing Book tackles the thorny issue of file sharing networks such as Kazaa, Morpheus, and Usenet. It explains how these networks work and how to use them. It exposes the dangers of using file sharing networks--including viruses, spyware, and lawsuits--and tells how to avoid them. In addition to covering how people use file sharing networks to share everything from music and video files to books and pornography, it also reveals how people use them to share secrets and censored information banned by their governments. Includes coverage of the ongoing battle between the software, video, and music pirates and the industries that are trying to stop them....

Ruby by Example

Concepts and Code
Ruby by Example Image
There may be no better way to learn how to program than by dissecting real, representative examples written in your language of choice. Ruby by Example analyzes a series of Ruby scripts, examining how the code works, explaining the concepts it illustrates, and showing how to modify it to suit your needs. Baird's examples demonstrate key features of the language (such as inheritance, encapsulation, higher-order functions, and recursion), while simultaneously solving difficult problems (such as validating XML, creating a bilingual program, and creating command-line interfaces). Each chapter builds upon the previous, and each key concept is highlighted in the margin to make it easier for you to navigate the book.You'll learn how to:Use the interactive R...

Network Flow Analysis

Network Flow Analysis Image
Unlike packet sniffers that require you to reproduce network problems in order to analyze them, flow analysis lets you turn back time as you analyze your network. You'll learn how to use open source software to build a flow-based network awareness system and how to use network analysis and auditing to address problems and improve network reliability. You'll also learn how to use a flow analysis system; collect flow records; view, filter, and report flows; present flow records graphically; and use flow records to proactively improve your network. Network Flow Analysis will show you how to: Identify network, server, router, and firewall problems before they become critical Find defective and misconfigured software Quickly find virus-spewing machines, e...



2007 - 2017 © eBooks-IT.org