Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Essential Mathematics for Games and Interactive Applications: A Programmer's Guide
Essential Mathematics for Games and Interactive Applications: A Programmer's Guide
"Even though I've worked with these systems for years, I found new ways of looking at several topics that make them easier to remember and use. For someone new to 3D programming, it is extremely usefulit gives them a solid background in pretty much every area they need to understand." Peter Lipson, Toys for Bob, Inc.

Based on
...
RFID-A Guide to Radio Frequency Identification
RFID-A Guide to Radio Frequency Identification
This book provides an introduction to RFID technology. It describes and addresses the following: How RFID works, how it is and can be used in current and future applications. The History of RFID technology, the current state of practice and where RFID is expected to be taken in the future. The role of middleware software to route data between the...
Principles of Embedded Networked Systems Design
Principles of Embedded Networked Systems Design
"...this volume represents a real mine of information...anyone working in the field would benefit from owning a copy." IEEE Communications Engineer

Embedded network systems (ENS) provide a set of technologies that can link the physical world to large-scale networks in applications, such as monitoring of borders,
...
IP Location
IP Location

In today's vast world of global commerce with users that are more nomadic than ever, the need for reliable, secure, and efficient access technologies is rapidly increasing. IP Location provides you with a guided tour of location determination, tackling this new technology head on and addressing all aspects of location management,...

Dreaming in Code: Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software
Dreaming in Code: Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software
Our civilization runs on software. Yet the art of creating it continues to be a dark mystery, even to the experts, and the greater our ambitions, the more spectacularly we seem to fail.

Big software projects regularly crash and burn--just ask the FBI and the IRS, the Pentagon and the FAA, or any decent-size corporation. The...

The New Language of Business: SOA & Web 2.0
The New Language of Business: SOA & Web 2.0
In The New Language of Business, senior IBM executive Sandy Carter demonstrates how to leverage SOA, Web 2.0, and related technologies to drive new levels of operational excellence and business innovation.

Writing for executives and business leaders inside and outside IT, Carter explains why flexibility and responsiveness...

Social, Ethical and Policy Implications of Information Technology
Social, Ethical and Policy Implications of Information Technology

Legal and ethical issues have become a standard part of engineering and business schools’ curricula. This has not been the case for computer science or management information systems programs although there has been increased emphasis on the social skills of these students. This leaves a frightening void in the student’s professional...

About Face 3: The Essentials of Interaction Design
About Face 3: The Essentials of Interaction Design
When the first edition of About Face was published in 1995, the idea of designing products based on human goals was a revolutionary concept. Thanks to the work of Alan Cooper and other pioneers, interaction design is now widely recognized as a unique and vital discipline, but our work is far from finished.

This completely updated volume...

A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness

Information technology is an increasingly large factor in legal proceedings. In cases large and small, from the U.S. Government's antitrust suit against Microsoft Corporation, to civil lawsuits filed over the failure of a network, to criminal cases in which the authenticity of electronic evidence is questioned, the testimony of a technical...

The Book of VMware: The Complete Guide to VMware Workstation
The Book of VMware: The Complete Guide to VMware Workstation

There's only so much you can do by multitasking applications. Frequently, you just need another computer for testing software, trying out network configurations, or doing any of a dozen things that engineers and administrators need to do. VMware allows you to run several virtual machines on one physical computer, each completely...

MacIntosh Technology in the Common Hardware Reference Platform
MacIntosh Technology in the Common Hardware Reference Platform
This book presents specifications and standards for the Apple Macintosh technology cited in the PowerPC Microprocessor Common Hardware Reference Platform (CHRP) specification.

The CHRP specification is a joint publication of Apple Computer, Inc., International Business Machines Corporation, and Motorola, Inc. It defines a common hardware
...
Peer-to-Peer : Harnessing the Power of Disruptive Technologies
Peer-to-Peer : Harnessing the Power of Disruptive Technologies

The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and...

unlimited object storage image
Result Page: 48 47 46 45 44 43 42 41 40 39 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy