Home | Amazing | Today | Tags | Publishers | Years | Search 
Quaternions for Computer Graphics
Quaternions for Computer Graphics

More than 50 years ago when I was studying to become an electrical engineer, I came across complex numbers, which were used to represent out-of-phase voltages and currents using the j operator. I believe that the letter j was used, rather than i, because the latter stood for electrical current. So from the very start of my studies I...

Network Defense: Perimeter Defense Mechanisms
Network Defense: Perimeter Defense Mechanisms

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Specification by Example: How Successful Teams Deliver the Right Software
Specification by Example: How Successful Teams Deliver the Right Software

The book you hold in your hands, or see on your screen, is the result of a series of studies of how teams all over the world specify, develop, and deliver the right software, without defects, in very short cycles. It presents the collective knowledge of about 50 projects, ranging from public websites to internal back-office systems....

Chemical Engineering Fluid Mechanics, Revised and Expanded
Chemical Engineering Fluid Mechanics, Revised and Expanded

The objectives of this book are twofold: (1) for the student, to show how the fundamental principles underlying the behavior of fluids (with emphasis on one-dimensional macroscopic balances) can be applied in an organized and systematic manner to the solution of practical engineering problems, and (2) for the practicing engineer, to...

Smashing WordPress: Beyond the Blog (Smashing Magazine Book Series)
Smashing WordPress: Beyond the Blog (Smashing Magazine Book Series)

Smashing WordPress shows you how to utilize the power of the WordPress platform, and provides a creative spark to help you build WordPress-powered sites that go beyond the obvious. The second edition of Smashing WordPress has been updated for WordPress 3.1+, which includes internal, custom post types, the admin bar, and lots of other...

Network Security Auditing (Networking Technology: Security)
Network Security Auditing (Networking Technology: Security)

Mention the word audit to IT professionals and you will probably see their eyes glaze over as they imagine frightening visions of auditors with pointy tails, pitchforks, and checklists run ning around and pointing out all of the things they have done wrong to their manager. The purpose of a security audit is not to place blame or pick...

Information Technology Auditing (with ACL CD-ROM)
Information Technology Auditing (with ACL CD-ROM)

The third edition of this text contains key improvements and changes that continue to provide instructors and students with the best information technology auditing text available. This edition has been reorganized and expanded to address the internal control and audit issues mandated by Sarbanes-Oxley legislation. The third edition...

Android 3.0 Application Development Cookbook
Android 3.0 Application Development Cookbook

This book covers every aspect of mobile app development, starting with major application components and screen layout and design, before moving on to how to manage sensors such as internal gyroscopes and near field communications. Towards the end, it delves into smartphone multimedia capabilities as well as graphics and animation, web access,...

BGP
BGP

This is a book about connecting to the Internet as reliably as possible. This means eliminating all single points of failure,including having just one Internet service provider (ISP). By multihoming to two or more ISPs,you can remain connected when either ISP (or your connection to them) experiences problems. However,there...

Design Methodologies for Secure Embedded Systems: Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss
Design Methodologies for Secure Embedded Systems: Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss

This Festschrift is dedicated to Mr. Sorin A. Huss by his friends and his Ph.D. students to honor him duly on the occasion of his 60th birthday.

Mr. Sorin A. Huss was born in Bukarest, Romania on May 21, 1950. He attended a secondary school with emphasis on mathematic and scientific topics in Dachau near Munich and after his Abitur...

The HCS12 / 9S12: An Introduction to Software and Hardware Interfacing
The HCS12 / 9S12: An Introduction to Software and Hardware Interfacing

The Freescale HCS12 (also known as 9S12) microcontroller family was initially designed for automotive applications. The design of the HCS12 combines most features common in major 8-bit and 16-bit microcontrollers.

1. Full-feature timer system. The HCS12 timer system provides input-capture, outputcompare, pulse-width...

Manager's Guide to Social Media (Briefcase Books Series)
Manager's Guide to Social Media (Briefcase Books Series)

JUMP START PRODUCTIVITY, PROFITABLILITY, AND BUSINESS GROWTH WITH SOCIAL MEDIA!

Facebook, Twitter, and YouTube have changed everything. Some managers fear their employees will waste entire days using online social media. Smart managers, though, understand that social media is a powerful tool for engaging customers and growing...

Result Page: 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy