Home | Amazing | Today | Tags | Publishers | Years | Search 
Forensic Computer Crime Investigation
Forensic Computer Crime Investigation
The Digital Age offers many far-reaching opportunities - opportunities that allow for fast global communications, efficient business transactions…and stealthily executed cyber crimes. Featuring contributions from digital forensic experts, the editor of Forensic Computer Crime Investigation presents a vital resource that outlines the latest...
Introducing Maya 6: 3D for Beginners
Introducing Maya 6: 3D for Beginners

"If you're just beginning to dive into the world of 3D, this is the book for you."
--Animation Magazine

Alias' Academy Award winning Maya 3D animation and effects software leads the industry in technological innovation. Film and video artists, computer game developers,...

Documentary in the Digital Age
Documentary in the Digital Age
If you want to learn from the leading lights of today's revolution in documentary filmmaking Maxine Baker has written the guide you need to own. You'll discover the many different and innovative approaches to documentary form and style arising from the use of innovative new technology. A tribute to the mavericks of creativity, inside you will find...
Evaluating Novel Threats to the Homeland: Unmanned Aerial Vehicles and Cruise Missiles
Evaluating Novel Threats to the Homeland: Unmanned Aerial Vehicles and Cruise Missiles
Deciding how to invest homeland security resources wisely in the United States can often appear to be an intractable problem because the large, open American society seems to be so vulnerable to so many threats in every corner of the country. This monograph is intended to help bound the problem in order to aid policy and resource decisions about...
Beginning Flash Game Programming For Dummies
Beginning Flash Game Programming For Dummies

You can start game programming in a flash

Here's how to create five different cool games — no experience necessary!

Ever think you could come up with a better computer game? Then this book is for you! No boring programming theory here, just the stuff you need to know to actually make something happen, and all in...

Red Hat Fedora Linux 3 For Dummies
Red Hat Fedora Linux 3 For Dummies
Get online with broadband DSL and build Web pages

Install Fedora Core 3, use OpenOffice.org, play CDs, and set up a firewall

The penguin is back, and better than ever! And this friendly guide will help you install and configure the new edition of Fedora Core so you can use exciting features like the SELinux infrastructure, which...

CorelDRAW: The Official Guide
CorelDRAW: The Official Guide
The Only Corel-Authorized Guide to CorelDRAW X4

Create fine art and commercial graphics with one powerful tool! CorelDRAW X4: The Official Guide shows you how to get a visual message across with impact and style; edit photos; build captivating layouts; and compose scenes in a clean, attention-getting style. Learn how...

Data Model Patterns: A Metadata Map (The Morgan Kaufmann Series in Data Management Systems)
Data Model Patterns: A Metadata Map (The Morgan Kaufmann Series in Data Management Systems)
A very ambitious undertaking, masterfully described. To the best of my knowledge, this is the first published version of the detailed models implied by the Zachman Framework. David Hay builds the models one step at a time, describing in each increment why the new entities were added, and how they related to the rest of the model. At least as...
Essential PowerShell (Addison-Wesley Microsoft Technology Series)
Essential PowerShell (Addison-Wesley Microsoft Technology Series)
Use PowerShell to Streamline and Automate Your Most Time-Consuming Windows Administration Tasks

 

With Windows PowerShell, Microsoft brings innovative console-based system administration and scripting to Windows clients and servers....

Soft Methods for Handling Variability and Imprecision (Advances in Soft Computing)
Soft Methods for Handling Variability and Imprecision (Advances in Soft Computing)
Probability theory has been the only well-founded theory of uncertainty for a long time. It was viewed either as a powerful tool for modelling random phenomena, or as a rational approach to the notion of degree of belief. During the last thirty years, in areas centered around decision theory, artificial intelligence and information processing,...
Global Distributed Applications With Windows DNA (Artech House Computing Library)
Global Distributed Applications With Windows DNA (Artech House Computing Library)
Provides a full description of the Microsoft Windows Distributed Internet Applications Architecture (DNA), its purpose, and its proper use for Internet applications development. DLC: Microsoft Windows (Computer file).

Welcome to Global Distributed Applications With Windows DNA. You have probably made a number of assumptions simply by
...
Role-Based Access Control, Second Edition
Role-Based Access Control, Second Edition
Role-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it can greatly lower the cost and complexity of securing large networked and Web-based systems. Written by leading experts, this newly revised edition of the Artech House bestseller, Role-Based Access Control, offers practitioners...
Result Page: 222 221 220 219 218 217 216 215 214 213 212 211 210 209 208 207 206 205 204 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy