Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Kamikaze: Japan's Suicide Gods
Kamikaze: Japan's Suicide Gods
The untold story of the Kamikaze pilots, a remarkable piece of military history and one of the most dramatic developments of World War II.

* Gripping real-life stories of life & death.
* Contains original material, interviews and new sources including excerpts from a never-before published suicide manual.
* Reports
...

Computer Vision: A Modern Approach (2nd Edition)
Computer Vision: A Modern Approach (2nd Edition)

 

Computer vision as a field is an intellectual frontier. Like any frontier, it is exciting and disorganized, and there is often no reliable authority to appeal to. Many useful ideas have no theoretical grounding, and some theories are useless in practice; developed areas are widely scattered, and
...
Focus On 3D Terrain Programming (Game Development)
Focus On 3D Terrain Programming (Game Development)

This book is one-of-a-kind. Most 3D programming books on the market today concentrate on only one (or two) of the four algorithms that are presented in this book. Terrain engines have applications in games, but also in various simulations and they play a very important part in military flight simulations. Terrain engine programming is not...

Afghanistan: A History from 1260 to the Present
Afghanistan: A History from 1260 to the Present
Located at the intersection of Asia and the Middle East, Afghanistan has been strategically important for thousands of years. Its ancient routes and strategic position between India, Inner Asia, China, Persia, and beyond has meant the region has been subject to frequent invasions, both peaceful and military. As a result, modern...
Webster's New World Hacker Dictionary
Webster's New World Hacker Dictionary
The comprehensive hacker dictionary for security professionals, businesses, governments, legal professionals, and others dealing with cyberspace.

Hackers. Crackers. Phreakers. Black hats. White hats. Cybercrime. Logfiles. Anonymous Digital Cash. ARP Redirect.

Cyberspace has a language all its own. Understanding it is vital
...
Wireless Sensor Networks and Applications (Signals and Communication Technology)
Wireless Sensor Networks and Applications (Signals and Communication Technology)
Wireless sensor networks are currently being employed in a variety of applications ranging from medical to military, and from home to industry. Wireless Sensor Networks and Applications aims to provide a reference tool for the increasing number of scientists who depend upon sensor networks in some way. The topics covered include network design and...
Risk Management for Computer Security: Protecting Your Network & Information Assets
Risk Management for Computer Security: Protecting Your Network & Information Assets
In an increasingly interconnected environment, we are consistently required to develop better and more cost-effective defenses for our information systems. In the past when information security was the realm of governments and the military and when security was only concernd with the confidentiality of the information, then the concept of...
Unstoppable Teams: The Four Essential Actions of High-Performance Leadership
Unstoppable Teams: The Four Essential Actions of High-Performance Leadership

Three-time Navy SEAL platoon commander and founder of Perfect Fitness reveals how to put together teams that can accomplish any objective—by leveraging an unexpected set of values and priorities.

SEALs and civilians operate in extremely different environments, but what makes both kinds of teams excel comes
...

Military Cryptanalysis, Part I, Monoalphabetic Substitution Systems (Cryptographic Series, C-30)
Military Cryptanalysis, Part I, Monoalphabetic Substitution Systems (Cryptographic Series, C-30)

This book provides an excellent foundation for solving cipher systems. The text describes the fundamental principles of cipher solution plus use of the unilateral frequency distribution in the solution process is covered in some detail. Various unilateral and multilateral systems are carefully discussed. In addition, the text introduces the...

Digital Electronics: Principles, Devices and Applications
Digital Electronics: Principles, Devices and Applications

Digital electronics is essential to understanding the design and working of a wide range of applications, from consumer and industrial electronics to communications; from embedded systems, and computers to security and military equipment. As the devices used in these applications decrease in size and employ more complex technology, it is...

PIC Basic Projects: 30 Projects using PIC BASIC and PIC BASIC PRO
PIC Basic Projects: 30 Projects using PIC BASIC and PIC BASIC PRO
Microcontrollers are single-chip computers consisting of CPU (central processing unit), data and program memory, serial and parallel I/O (input/output), timers, external and internal interrupts, all integrated into a single chip that can be purchased for as little as $2.00. Microcontrollers are intelligent electronic devices used to control and...
Instant Boris Effects (VASST Instant)
Instant Boris Effects (VASST Instant)
Boris plug-in applications, including Graffiti, FX, and Red, permit video editors to add titling, effects, compositing, and 3D capabilities to their nonlinear editing (NLE) systems. Documentation and training materials have been notoriously lacking for these applications. Instant Boris Effects is a complete guide for novice and intermediate users...
unlimited object storage image
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy