 |
|
 Quaternions for Computer Graphics
More than 50 years ago when I was studying to become an electrical engineer,
I came across complex numbers, which were used to represent out-of-phase voltages
and currents using the j operator. I believe that the letter j was used, rather
than i, because the latter stood for electrical current. So from the very start of my
studies I... |  |  Network Defense: Perimeter Defense Mechanisms
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  Specification by Example: How Successful Teams Deliver the Right Software
The book you hold in your hands, or see on your screen, is the result of a series
of studies of how teams all over the world specify, develop, and deliver the
right software, without defects, in very short cycles. It presents the collective
knowledge of about 50 projects, ranging from public websites to internal back-office
systems.... |
|
 Chemical Engineering Fluid Mechanics, Revised and Expanded
The objectives of this book are twofold: (1) for the student, to show how the
fundamental principles underlying the behavior of fluids (with emphasis on
one-dimensional macroscopic balances) can be applied in an organized and
systematic manner to the solution of practical engineering problems, and (2)
for the practicing engineer, to... |  |  Smashing WordPress: Beyond the Blog (Smashing Magazine Book Series)
Smashing WordPress shows you how to utilize the power of the WordPress platform, and provides a creative spark to help you build WordPress-powered sites that go beyond the obvious. The second edition of Smashing WordPress has been updated for WordPress 3.1+, which includes internal, custom post types, the admin bar, and lots of other... |  |  Network Security Auditing (Networking Technology: Security)
Mention the word audit to IT professionals and you will probably see their eyes glaze over as
they imagine frightening visions of auditors with pointy tails, pitchforks, and checklists run
ning around and pointing out all of the things they have done wrong to their manager. The
purpose of a security audit is not to place blame or pick... |
|
|
|
Result Page: 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 |