|
|
|
|
|
|
|
No Logo : Taking Aim at the Brand BulliesIf I squint, tilt my head, and shut my left eye, all I can see out the window is 1932, straight down to the lake. Brown warehouses, oatmeal-colored smokestacks, faded signs painted on brick walls advertising long-discontinued brands: "Lovely," "Gaywear." This is the old industrial Toronto of garment factories, furriers and... | | Network Security: Private Communication in a Public World (2nd Edition)
Authors with credentials from some of the top software and hardware companies explain the latest advances in computer network security protocol. For security managers, programmers, and graduate or advanced undergraduate students.
It was a dark and stormy night. Somewhere in the distance a dog howled. A shiny object... | | Texturing and Modeling, Third Edition: A Procedural Approach
What is a realistic image? This is an age-old question in art, and a contemporary
question in computer graphics. This book provides a modern answer involving the
computer and a new definition of realism.
The classic definition of realism has been veridical realism. Does the picture pass
the comparison test? That is, would an... |
|
|
Result Page: 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 |