|
|
|
|
Blog Theory: Feedback and Capture in the Circuits of Drive
The challenge of this book is thinking critically about media practices in a setting where they are fast, fun, and ubiquitous. As an avowedly engaged and political approach to thought, critical theory of any sort encounters challenges. Attempting to analyze and intervene in the present, it nonetheless adopts a backward gaze, an idea G.W.F.... | | Advanced 3ds max 5 Modeling & AnimatingIn this comprehensive game development reference, users are taken from modeling a still-life scene to animating photo-realistic and fantasy characters in a variety of organic and mechanical backgrounds.
This book focuses on practical work with the 3ds max modeling and animation package from Discreet and is a follow-up to the book... | | The Science of SupervillainsThe science behind the scoundrels we love to hate
From Spider-Man’s bionic archenemy, Dr. Octopus, to Superman’s nemesis, Lex Luthor, to the X-Men’s eternal rival, Magneto, comic book villains have kept us captivated for years---- not just by their diabolical talent for confounding our heroes, but also by their unrivaled... |
|
| | The Myths of InnovationHow do you know whether a hot technology will succeed or fail? Or where the next big idea will come from? The best answers come not from the popular myths we tell about innovation, but instead from time-tested truths that explain how we've made it this far. This book shows the way. In The Myths of Innovation, bestselling... | | |
|
Maya: Secrets of the ProsIn this unique full-color book, a cadre of professionals led by Maya expert and best-selling author, John Kundert-Gibbs, team up to share what they’ve learned using Maya in the CG trenches.
Contributing authors include veterans of such high-profiles projects as The Lord of the Rings trilogy, Final Fantasy: The Spirits... | | Test Driving Linux: From Windows to Linux in 60 SecondsFor years, computer users have put up with the bugs, security holes, and viruses on Windows because they had no choice. Until recently, there has never been a good alternative to Windows. But now, Windows users can switch to Linux, the reliable, secure, and spyware free operating system. Linux is easy to use, runs on almost any PC, and enables you... | | Malicious Cryptography: Exposing CryptovirologyHackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first... |
|
|
|
Result Page: 7 6 5 4 3 2 1 |