Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Musical Performance: A Comprehensive Approach: Theory, Analytical Tools, and Case Studies
Musical Performance: A Comprehensive Approach: Theory, Analytical Tools, and Case Studies

This book is a first sketch of what the overall field of performance could look like as a modern scientific field but not its stylistically differentiated practice, pedagogy, and history. Musical performance is the most complex field of music. It comprises the study of a composition’s expression in terms of...

Replay: The History of Video Games
Replay: The History of Video Games

A riveting account of the birth and remarkable evolution of the most important development in entertainment since television, Replay: The History of Video Games is the ultimate history of video games. From its origins in the research labs of the 1940s to the groundbreaking success of the Wii, Replay sheds new light on gaming's past. Along...

Image Processing with ImageJ
Image Processing with ImageJ

Discover the incredible possibilities of ImageJ, from basic image processing to macro and plugin development

Overview

  • Learn how to process digital images using ImageJ and deal with a variety of formats and dimensions, including 4D images
  • Understand what histograms, region of interest, or...
Submarine Warfare An Illustrated History
Submarine Warfare An Illustrated History
The lure of underwater travel seems to have obsessed inventors almost as much as the wish to fly, but the first attempt to address practical problems did not come until the sixteenth century. In 1578 an Englishman called William Bourne wrote of a submersible boat in his book Inventions and Devices.

Although there is no evidence that
...
Food Intolerance and the Food Industry
Food Intolerance and the Food Industry

(Woodhead Publishing Limited) Provides an authoritative guide to they key issues in dealing with food intolerance within the food industry. Text explains key terminology and the mechanisms of food intolerance, key issues for those trying to minimize the amount of allergens in food, current labeling requirements and international sources of...

PGP: Pretty Good Privacy
PGP: Pretty Good Privacy

Use of the Internet is expanding beyond anyone's expectations. As corporations, government offices, and ordinary citizens begin to rely on the information highway to conduct business, they are realizing how important it is to protect their communications -- both to keep them a secret from prying eyes and to ensure that they are not...

Algorithms For Dummies (For Dummies (Computers))
Algorithms For Dummies (For Dummies (Computers))

Discover how algorithms shape and impact our digital world

All data, big or small, starts with algorithms. Algorithms are mathematical equations that determine what we see—based on our likes, dislikes, queries, views, interests, relationships, and more—online. They are, in a sense, the electronic gatekeepers to...

Warfare and Weaponry in Dynastic Egypt
Warfare and Weaponry in Dynastic Egypt

Defence. Attack. Symbolism. The development of warfare in any society provides an evocative glance into the lives (and deaths) of our predecessors. This is never more the case than with that most enticing of ancient civilizations, Ancient Egypt. Follow Rebecca Dean through the fascinating world of mysterious figures such as...

Captain Bligh's Portable Nightmare: From the Bounty to Safety?4,162 Miles across the Pacific in a Rowing Boat
Captain Bligh's Portable Nightmare: From the Bounty to Safety?4,162 Miles across the Pacific in a Rowing Boat
At dawn on April 28, 1789, Captain William Bligh and eighteen men from HMS Bounty were herded onto a twenty-three-foot launch and abandoned in the middle of the Pacific Ocean. Thus began their extraordinary journey to Java. Covering 4,162 miles, the small boat was battered by continuous storms, and the men on board suffered crippling...
Practical Unix & Internet Security, Second Edition
Practical Unix & Internet Security, Second Edition
This book is a practical guide to UNIX security. For users, we explain what computer security is, describe some of the dangers that you may face, and tell you how to keep your data safe and sound. For administrators, we explain in greater detail how UNIX security mechanisms work and tell how to configure and administer your computer for maximum...
The Worldwide History of Telecommunications
The Worldwide History of Telecommunications
The first comprehensive history of the Information Age how we got there and where we are going

The exchange of information is essential for both the organization of nature and the social life of mankind. Until recently, communication between people was more or less limited by geographic proximity. Today, thanks to ongoing innovations in...

Video Game Design Revealed (Revealed (Charles River Media))
Video Game Design Revealed (Revealed (Charles River Media))

Whether you are a professional game developer working in an established studio or a creative thinker interested in trying your hand at game design, "Video Game Design Revealed" will show you the steps and processes involved in bringing a video game from concept to completion. Beginning with an overview of the...

unlimited object storage image
Result Page: 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy