NEW! ADOBE CC (2019 RELEASE)
Pre-order and save 35% on books and eBooks to help you learn to use Adobe's key creative products.
Publishers of technology books, eBooks, and videos for creative people
Adobe announced the newest generation of the Adobe Creative Cloud, its suite of software and Web-based services for the creative community, available immediately.
The IT Professional division of Pearson is excited to align to the announced with a product suite of 8 titles planned for the Creative Cloud (2017 release) from the world’s greatest authors and series from Adobe Press and Peachpit. The new products offer training and inspiration to all user levels and cover a broad range of topics within the Creative Cloud.
Your wife’s surprise birthday party is tomorrow. You’ve prepared a top notch slideshow on your Mac using Keynote, and transferred it to your iPad. Great! Now you can present directly from the iPad. There’s only one problem. The fonts in your presentation are no longer appearing properly because the iPad doesn’t have all the same fonts your Mac does. It looks like you might have to lug your Mac along too. No, with Automator’s help, you can just replace the problem text with images. Here’s how...
A Joomla! web site is no more or less secure than any other CMS or custom developed web site. All web sites are vulnerable to malicious attacks, hackers, and spammers if you don't take the necessary steps to protect them. Securing a Joomla web site is as important as it is simple, just follow the checklist outlined in this article.
Many factors go into the security of a Web site, particularly an e-commerce one. While creating a secure Web application in the first place is a key component, there's an easy way to improve the security of a site over time: by maintaining secure passwords. In this post, I'll explain what this means.
A feature of many of today's Web sites is the ability for users to upload files to the server. While often necessary, this process presents a new type of risk to servers and sites, whether any user can upload a file or just an administrator can. In this post, I explain what steps you can take to limit the risks of allowing for file uploads.
The bulk of security-related advice is based upon preventing break-ins, hacks, and attacks, but responsible e-commerce developers and administrators know that it's just as important to have created an emergency plan well before trouble occurs. In this post, Larry Ullman talks about why an emergency plan is important and what, exactly, that means.
The security of an e-commerce site depends upon so many things: the hosting involved, keeping all the software updated, using secure passwords, and so forth. But when it comes to the software you write--the Web application itself--the most fundamental security concept is that incoming data is validated, validated, and validated. In this post, Larry Ullman writes about what that means, from the concept to the implementation.
Suppose you want to use ActionScript to manipulate a symbol that is nested inside another symbol. For example, imagine you have an instance of a symbol named menuHolder on Stage, and inside menuHolder, there is an instance of a symbol named menuItem.
One of the great strengths of the SWF file format (the Flash output format) is its compact size. The SWF file format is one of the best ways to deliver a multimedia experience over a reasonably small bandwidth. Keeping your file size as small as possible ensures that your viewers will have a minimal wait time before seeing your work.
Did you know that bitmaps (jpgs, pngs, gifs, tiffs) can be used to fill shapes in Flash? When a bitmap is used for a fill, the shape containing the fill acts as a mask.
To faciliate easy editing of your Flash file, it's a good rule of thumb to place each asset on its own layer. This is especially true if you plan to animate or tween any of the assets (since only one item can be tweened per layer). However, there are many occasions when it is sensible to create your artwork on a single layer.