Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Stop Staring: Facial Modeling and Animation Done Right
Stop Staring: Facial Modeling and Animation Done Right
Breathe life into your creations

With detailed examples, high-quality professional images, and a touch of humor, this is the fully revised and updated second edition of Jason Osipa's best-selling book on facial animation. You'll learn the basics of design, modeling, rigging, and animation—while mastering exciting new techniques for...

Net Crimes & Misdemeanors: Outmaneuvering Web Spammers, Stalkers, and Con Artists
Net Crimes & Misdemeanors: Outmaneuvering Web Spammers, Stalkers, and Con Artists
If you are reading this book or thinking about acquiring it, you have taken an important step toward increasing your awareness of the ways in which the Internet may be abused. J. A. Hitchcock has prepared a second edition of her popular book, Net Crimes and Misdemeanors, reflecting new ways in which you may encounter the dark side of global...
Complex Dynamics in Communication Networks (Understanding Complex Systems)
Complex Dynamics in Communication Networks (Understanding Complex Systems)
Computer and communication networks are among society's most important infrastructures. The internet, in particular, is a giant global network of networks with central control or administration. It is a paradigm of a complex system, where complexity may arise from different sources: topological structure, network evolution, connection and node...
The Cable and Telecommunications Professionals' Reference, Volume 2, Third Edition: Transport Networks
The Cable and Telecommunications Professionals' Reference, Volume 2, Third Edition: Transport Networks
A thorough reference for any telecommunications or networking professional who needs to understand the convergence of telephony, data transfer, and wireless communications, from simple descriptions down to the math.

Volume 2 of TERB 3ed covers the convergence of telephony and data transport, including wireless networks. Now
...
Principles of Genetics
Principles of Genetics

The twentieth century began with the rediscovery of Mendel’s rules of inheritance and ended with the complete sequence of the human genome, one of the most monumental scientific accomplishments of all time. What lies in the future? What will the twenty-first century, the century of genomics, bring? Will geneticists a hundred years from...

Programming the Propeller with Spin: A Beginner's Guide to Parallel Processing (Tab Electronics)
Programming the Propeller with Spin: A Beginner's Guide to Parallel Processing (Tab Electronics)

Parallel Processing With the Propeller--Made Easy!

Programming the Propeller with Spin: A Beginner's Guide to Parallel Processing walks you through the essential skills you need to build and control devices using the Propeller chip and its parallel processing environment. Find out how to use each of the identical...

Embedded Software Development with eCos
Embedded Software Development with eCos

In 1997. there were over 100 commercially supported embedded operating systems, none of which had more than a minority share of the overall embedded OS market, not to mention countless thousands of others developed for specific projects (cell phones, radar arrays, networking equipment, etc.) that had no application developer base beyond that...

Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

CCNP Security Firewall 642-617 Official Cert Guide
CCNP Security Firewall 642-617 Official Cert Guide

CCNP Security FIREWALL 642-617 Official Cert Guide is a best of breed Cisco exam study guide that focuses specifically on the objectives for the CCNP Security FIREWALL exam. Senior security consultants and instructors David Hucaby, Dave Garneau, and Anthony Sequeira share preparation hints and test-taking tips,...

Beginning Windows 8 Application Development – XAML Edition
Beginning Windows 8 Application Development – XAML Edition

Beginning Windows 8 Application Development – XAML Edition introduces you to the Windows 8 modern app design paradigm and the new Windows 8 programming model developed around this paradigm.  You'll learn to build rich, immersive applications designed to run on the many devices that will be powered by Windows 8.

...
TeamCity 7 Continous Integration
TeamCity 7 Continous Integration

Nowadays, Agile application development is usually done at a fast pace when many developers are working on the same piece of code. Every so often, this becomes a real challenge if there's no permanent control over consistency of the project source. It is often impossible to force lazy and/or busy programmers to execute tests before and...

Salesforce CRM Admin Cookbook
Salesforce CRM Admin Cookbook

Over 40 recipes to make effective use of Salesforce CRM with the use of hidden features, advanced user interface techniques, and real-world solutions

Overview

  • Implement advanced user interface techniques to improve the look and feel of Salesforce CRM
  • Discover hidden features and hacks that...
unlimited object storage image
Result Page: 313 312 311 310 309 308 307 306 305 304 303 302 301 300 299 298 297 296 295 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy