|
|
|
|
Stop Staring: Facial Modeling and Animation Done RightBreathe life into your creations
With detailed examples, high-quality professional images, and a touch of humor, this is the fully revised and updated second edition of Jason Osipa's best-selling book on facial animation. You'll learn the basics of design, modeling, rigging, and animation—while mastering exciting new techniques for... | | Net Crimes & Misdemeanors: Outmaneuvering Web Spammers, Stalkers, and Con ArtistsIf you are reading this book or thinking about acquiring it, you have taken an important step toward increasing your awareness of the ways in which the Internet may be abused. J. A. Hitchcock has prepared a second edition of her popular book, Net Crimes and Misdemeanors, reflecting new ways in which you may encounter the dark side of global... | | Complex Dynamics in Communication Networks (Understanding Complex Systems)Computer and communication networks are among society's most important infrastructures. The internet, in particular, is a giant global network of networks with central control or administration. It is a paradigm of a complex system, where complexity may arise from different sources: topological structure, network evolution, connection and node... |
|
|
Embedded Software Development with eCos
In 1997. there were over 100 commercially supported embedded operating systems, none of which had more than a minority share of the overall embedded OS market, not to mention countless thousands of others developed for specific projects (cell phones, radar arrays, networking equipment, etc.) that had no application developer base beyond that... | | Design of Hashing Algorithms (Lecture Notes in Computer Science)
Historically, computer security is related to both cryptography and access
control in operating systems. Cryptography, although mostly applied in
the military and diplomacy, was used to protect communication channels
and storage facilities (especially the backups). In the seventies there was a
breakthrough in cryptography - the... | | CCNP Security Firewall 642-617 Official Cert Guide
CCNP Security FIREWALL 642-617 Official Cert Guide is a best of breed Cisco exam study guide that focuses specifically on the objectives for the CCNP Security FIREWALL exam. Senior security consultants and instructors David Hucaby, Dave Garneau, and Anthony Sequeira share preparation hints and test-taking tips,... |
|
Beginning Windows 8 Application Development – XAML Edition
Beginning Windows 8 Application Development – XAML Edition introduces you to the Windows 8 modern app design paradigm and the new Windows 8 programming model developed around this paradigm. You'll learn to build rich, immersive applications designed to run on the many devices that will be powered by Windows 8. ... | | TeamCity 7 Continous Integration
Nowadays, Agile application development is usually done at a fast pace when many developers are working on the same piece of code. Every so often, this becomes a real challenge if there's no permanent control over consistency of the project source. It is often impossible to force lazy and/or busy programmers to execute tests before and... | | Salesforce CRM Admin Cookbook
Over 40 recipes to make effective use of Salesforce CRM with the use of hidden features, advanced user interface techniques, and real-world solutions
Overview
-
Implement advanced user interface techniques to improve the look and feel of Salesforce CRM
-
Discover hidden features and hacks that...
|
|
|
Result Page: 313 312 311 310 309 308 307 306 305 304 303 302 301 300 299 298 297 296 295 |