 |
|
 Digital Filmmaking for TeensYou don't have to invest a small fortune, own expensive gear, and employ an army of technicians to create a movie. Today's high-tech tools will fit in your backpack and don't require the financial backing of a major movie studio, making this the first generation in the history of moviemaking that doesn't have to beg for big bucks to put its stories... |  |  Now You See It, Now You Don't!: Lessons in Sleight of HandA new and simple learn-by-picture method that makes it easy for anyone aged twelve and up to perform all the classic sleights just as they are done by the world's greatest professional magicians. Long-time magician Bill Tarr has teamed up with Barry Ross, an illustrator famous for his instructional sports diagrams, for easy-to-follow,... |  |  Developing Serious Games (Game Development Series)With the impressive growth the games industry has enjoyed for the past decade, game developers, educators, and marketing firms are excitedly envisioning serious games applications for computer game technologies. These applications- serious games- represent opportunities for game developers to apply their talents to areas outside of the... |
|
 |  |  |  |  Nokia Firewall, VPN, and IPSO Configuration GuideThe Only Book and Companion Web Site Covering Nokia's Firewall/VPN Appliances, which is the #3 security appliance worldwide.
"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its... |
|
 |  |  |  |  Enhancing E-Learning with Media-Rich Content and InteractionsOnline learning is transcending from the text-rich educational experience of the past to a video- and audio-rich learning transformation. The greater levels of media-rich content and media-rich interaction that are currently prevalent in online leisure experiences will help to increase e-learning s future efficiency and effectiveness.... |
|
 Historical Information Science: An Emerging UnidisciplineIt suggests that trends in information retrieval, research, and teaching using modern information technology point toward a unidisciplinary field, Historical Information Science, which potentially can grow out of older quantification and Social Science history, the interplay between History and Information Science, and new methodologies and... |  |  Malware Forensics: Investigating and Analyzing Malicious Code
Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and... |  |  Guide to Computer Network Security (Computer Communications and Networks)Contemporary societies have increasing dependence on computers and computer networks, and the increasing popularity of mobile computing, have given rise to numerous computer security problems. Yet despite a high proliferation of expert remedies, a viable and comprehensive solution to these security issues remains elusive, and society continues to... |
|
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 |