Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Direct3D ShaderX: Vertex and Pixel Shader Tips and Tricks with CDROM
Direct3D ShaderX: Vertex and Pixel Shader Tips and Tricks with CDROM
Vertex and pixel shader programming allows graphics and game developers to create photorealistic graphics on the personal computer for the first time. And with DirectX, programmers have access to an assembly language interface to the transformation and lighting hardware (vertex shaders) and the pixel pipeline (pixel shaders). Direct3D ShaderX...
Comprehensive Management of Skull Base Tumors
Comprehensive Management of Skull Base Tumors

Over a decade has passed since the publication of the successful first edition of Comprehensive Management of Skull Base Tumors, and much has happened in the intervening years. Major advances have been made in the surgical, radiotherapeutic, and chemotherapeutic management of skull base neoplasms. Coincident has been the rapidly advancing...

Mission Critical Internet Security
Mission Critical Internet Security
The best security for a network segment is isolation, but that's not an option if you want your users to enjoy Internet connectivity. Mission Critical Internet Security explores your options for protecting your network from attack across the Internet, emphasizing firewall solutions from Cisco, Symantec, Microsoft, and Check Point. This...
Advanced ActionScript 3 with Design Patterns
Advanced ActionScript 3 with Design Patterns
Today's ActionScript-based applications require increasingly sophisticated architectures and code. This book aids intermediate and advanced ActionScript developers in learning how to plan and build applications more effectively. You'll learn how to apply design patterns as solutions to common programming scenarios. Beyond a reference,...
Cyber Adversary Characterization: Auditing the Hacker Mind
Cyber Adversary Characterization: Auditing the Hacker Mind
A book about hacking is a book about everything.
First, the meaning of hacker.

The word “hacker” emerged in an engineering context and became popular
at The Massachusetts Institute of Technology (MIT), among other places, as a
way to talk about any ingenious, creative, or unconventional use of a machine...
CCNP Routing Exam Certification Guide
CCNP Routing Exam Certification Guide
The Cisco Certified Network Professional (CCNP) and Cisco Certified Design Professional (CCDP) certifications on the Routing and Switching career track are becoming increasingly popular. These certifications have as their foundation the Cisco Certifed Network Associate (CCNA) certification and these profesional-level certifications form the second...
AdvancED Game Design with Flash
AdvancED Game Design with Flash

Creating games in Flash is a never-ending journey of exploration, learning, and most of all, fun. Once you’ve mastered the basics, a new world is opened up to you, enabling you to take your existing skills to the next level and discover new skills that will in turn open new doors. This book is a direct continuation of Foundation...

Learning Articulate Storyline
Learning Articulate Storyline

Storyline is an authoring tool packed with out-of-the-box features that don’t require any special knowledge to operate. That’s right; this is a programming-free zone! E-learning authoring is no longer limited to developers; the doors are now wide open for subject matter experts with their content, writers with their storyboards,...

Ancient Remedies: Secrets to Healing with Herbs, Essential Oils, CBD, and the Most Powerful Natural Medicine in History
Ancient Remedies: Secrets to Healing with Herbs, Essential Oils, CBD, and the Most Powerful Natural Medicine in History
Bestselling author Dr. Josh Axe explains how to treat more than seventy diseases, lose weight, and increase vitality with traditional healing practices passed down through the ages. "Engaging, accessible and comprehensive" (Amy Myers, MD, author of The Autoimmune Solution)

Long before the first
...
Zenoss Core Network and System Monitoring
Zenoss Core Network and System Monitoring
As the world becomes more connected, the complexity of information technology is expanding. Information workers rely on an expanding number of technologies to collaborate: email, instant messaging, web forums, and wikis. Organizations that at one time relied solely on paper are becoming more dependent on information systems. In addition there is an...
Undercover User Experience Design (Voices That Matter)
Undercover User Experience Design (Voices That Matter)

Once you catch the user experience bug, the world changes. Doors open the wrong way, websites don't work, and companies don't seem to care. And while anyone can learn the UX remedies usability testing, personas, prototyping and so on unless your organization 'gets it', putting them into practice is trickier. Undercover User...

The Two Income Trap: Why Middle-Class Mothers and Fathers Are Going Broke
The Two Income Trap: Why Middle-Class Mothers and Fathers Are Going Broke
This groundbreaking exposé brings to light the surprising financial consequences of mothers going to work, and the precarious position of today's middle class.

More than two decades ago, the women's movement flung open the doors of the workplace. Although this social revolution created a firestorm of controversy, no one questioned the...

unlimited object storage image
Result Page: 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy