|
|
|
|
Augmented Reality: An Emerging Technologies Guide to AR
Augmented reality (AR) is a technology whose time has come. Conceived in rudimentary
form as early as the 1960’s, AR is only now becoming truly practical. Recent
advances in mobile processing, coupled with an explosion in digital storage capacity,
ubiquity of wireless broadband connections, mass adoption of smart phones, and... | | eMbedded Visual Basic: Windows CE and Pocket PC Mobile ApplicationsThis book is an in-depth exploration into eVB's inherent features, and how to use them to solve likely mobile application programming tasks. After reading the book the reader will be able to write applications tackling a wide array of business problems for Windows CE-powered devices, both customized and for PocketPC and Handheld PC products. This... | | |
|
| | Soldier, Sailor, Frogman, Spy, Airman, Gangster, Kill or Die: How the Allies Won on D-Day
A ground-breaking account of the first 24 hours of the D-Day invasion told by a symphony of incredible accounts of unknown and unheralded members of the Allied – and Axis – forces.
An epic battle that involved 156,000 men, 7,000 ships and 20,000 armoured vehicles, D-Day was, above all, a tale of... | | Answering Tough Interview Questions for DummiesCongratulations! In picking up Answering Tough Interview Questions For Dummies, you are about to embark on a journey that transforms you into the kind of high-calibre candidate who has employers fighting to hire you. Perhaps you are on the lookout for your first job or trying to return to work. Maybe you are a seasoned executive trying to climb... |
|
|
Ninja Mind ControlNow you can unlock the ancient secrets of Ninja mind control and discover for yourself the fantastic powers of the legendary Ninja warriors. By combining simple methods of meditation with aggressive maneuvers, you can become the master of any situation--from the author of Ninja Secrets of Invisibility.
NINJA MIND CONTROL is, without... | | Malware: Fighting Malicious CodeIgnoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy... | | Africa since 1800This book, the Fifth Revised Edition of a well-known introductory textbook, has remained in steady demand for the past forty years. The new edition covers events up to the middle of 2003, and takes account of the fresh perspectives brought about by the end of the Cold War and the new global situation following the events of September 11, 2001. It... |
|
|
Result Page: 10 9 8 7 6 5 4 3 2 1 |