Core HTML5 Canvas: Graphics, Animation, and Game Development (Core Series)
In the summer of 2001, after 15 years of developing graphical user interfaces and
graphics-intensive applications, I read a best-selling book about implementing
web applications by someone I did not know—Jason Hunter—but whom, unbeknownst
to me, would soon become a good friend on the No Fluff Just Stuff
(NFJS) tour.... Aggressive Network Self-Defense I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
- Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
- Follow the travails of eight system administrators who take cyber law into their own hands.
3ds Max Modeling: Bots, Mechs, and Droids (Wordware Game and Graphics Library)
3ds Max Modeling: Bots, Mechs, and Droids offers an unparalleled, project-based learning strategy for anyone who is interested in modeling with 3ds Max. From the very first pages, readers will discover how to use the Max toolset to create sophisticated models, including a spider bot, hunter-killer, battle mech, and android. Learn how to use...
Starting Strength (2nd edition)
Many things have happened since I started the writing of Starting Strength: A Simple
and Practical Guide for Coaching Beginners in 2004. As a result of its publication I have had
the opportunity to meet and learn from many new people. It is my sincerest hope that the
additions to this book that are the direct result of their input... Visual C# Game Programming for Teens
Imagine this scenario: You create a hunter character with random stats and hit points and enter the dungeon to begin exploring for treasure. You stumble upon a zombie pacing near a pile of gear and gold! You attack the zombie and it strikes back! You roll 1D20 and score a critical hit! The 20 point die plus dexterity, against the...
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.) There exists a 0-day vulnerability in a particular line of SCADA Master products that are widely used in petrochemical facilities. Furthermore, since the telemetry between the Master and the RTUs (the units located at valves, gauges, etc.) is particularly fragile under attack, the attackers are able to take a two-tiered approach to the damage they... Active Directory Cookbook, 3rd Edition When you need practical hands-on support for Active Directory, the updated edition of this extremely popular Cookbook provides quick solutions to more than 300 common (and uncommon) problems you might encounter when deploying, administering, and automating Microsoft's network directory service. For the third edition, Active Directory expert Laura...
Born Of The Night (The League)
Kidnapped by merciless marauders who threaten her father's planetary kingdom, princess Kiara is rescued by a masked stranger known as Nemesis, a renegade assassin and warrior-soldier who has sworn to protect the innocent. Original.
Best-selling author Sherrilyn Kenyon (The Dark-Hunter novels) restores three out-of-print titles in...
Cover Letters For Dummies
Now completely updated for online and on-paper job search — the only guide to new-style letters that get you in the door
Go beyond the classic cover letter! Whether you're a new or experienced job hunter, this guide offers you fresh ideas for crafting a wide variety of engaging cover letters and innovative career marketing...
|Result Page: 3 2 1 |