The Shadow Effect: Creative Lighting, Posing, and Composition for Photographers

Image

The Shadow Effect: Creative Lighting, Posing, and Composition for Photographers by David Beckstead
English | November 15, 2016 | ISBN: 168203108X | PDF | 128 pages | 72.8 MB

Photographers know that they must use highlight and shadow to create a sense of dimension in their portraits, sculpt their subject's features, and add palpable mood in their images. However, enterprising photographers know that these uses of shadow only scratch the surface when it comes to maximizing their portrait effects. They are willing to go to surprising lengths to create dramatic shadow patterns that add texture, a sense of mystery, and compositional interest in their portraits.

In this beautifully illustrated book, award-winning photographer David Beckstead showcases 180 of his most powerful images and explains how each shadow effect was created using commercial lighting, natural light, store-bought modifiers, and even common household items. Armed with the techniques outlined in this book, you will find a host of creative means to introduce and manipulate shadow patterns-both in the studio and on location-and watch your creative efforts and profits surge.



Image

Security without Obscurity: A Guide to PKI Operations

Image

Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.509 certificates, certificate authority (CA) hierarchies, or certificate policy (CP), and certificate practice statements. While algorithms, certificates, and theoretical policy are all excellent discussions, the real-world issues for operating a commercial or private CA can be overwhelming.

Security without Obscurity: A Guide to PKI Operations provides a no-nonsense approach and realistic guide to operating a PKI system. In addition to discussions on PKI best practices, the book supplies warnings against bad PKI practices. Scattered throughout the book are anonymous case studies identifying both good and bad practices.

The highlighted bad practices, based on real-world scenarios from the authors’ experiences, illustrate how bad things are often done with good intentions but cause bigger problems than the original one being solved.

This book offers readers the opportunity to benefit from the authors’ more than 50 years of combined experience in developing PKI-related policies, standards, practices, procedures, and audits, as well as designing and operating various commercial and private PKI systems.




Image