|
|
Second Life the official guide
When Second Life launched in 2003. running on just 16
servers with barely 1 .ÐÐÐdedicated users, it was the
culmination of a kind of dream for me. One of the things
Td always been interested in, ever since I was a young
boy, was how we manipulate the world around us.
The world had so much stuff in it; there was always... | | Joomla! VirtueMart 1.1 Theme and Template Design
Since you picked this book, the odds will be that you are already familiar with Joomla! VirtueMart. You will agree that this open source e-commerce solution is definitely amazing and feature-rich. That's why you want to stick with it. However, you still find there are some things here and there that don't quite fit your requirements.... | | Windows 7 Inside Out, Deluxe Edition
By some measures, Windows 7 sets a new standard for usability. It needs less out-of-the-box tweaking and troubleshooting than any Windows version we’ve ever used. The arrangement of folders and files in Windows Explorer, basic system security, User Account Control settings, and numerous other default configuration options are... |
|
The Definitive Guide to Drupal 7
Drupal is a great content management system, a powerful framework for web applications, and a cutting
edge social publishing platform. Above all, Drupal is more than software—it is a vibrant community of
developers, designers, project managers, business innovators, technology strategists, user experience
professionals, standards... | | HTML5: The Missing Manual
At first glance, you might assume that HTML5 is the fifth version of the
HTML web-page-writing language. But the real story is a whole lot messier.
HTML5 is a rebel. It was dreamt up by a loose group of freethinkers who
weren’t in charge of the official HTML standard. It allows page-writing practices
that... | | Packet Guide to Routing and Switching
For a long time, I was very happy building Ethernet networks, working with switches
and then moving to 802.11. It took awhile, but eventually I realized that the world of
interconnected networks cannot be reached with Layer 2 alone. In addition, as you
spread your wings from the Layer 2 broadcast domains, you encounter the wonders of... |
|
Printing in Plastic: Build Your Own 3D Printer (Technology in Action)
The book you’re holding in your hands is going to show you how to build your very own 3D Printer. It’s
not science fiction. It’s a device that will allow you to print out (in plastic) whatever you can imagine.
(Okay, that’s a bit of a stretch – there are size limitations when using this machine.)
Read the... | | Java For Dummies
Java is good stuff. I’ve been using it for years. I like Java because it’s very
orderly. Almost everything follows simple rules. The rules can seem
intimidating at times, but this book is here to help you figure them out. So, if
you want to use Java and want an alternative to the traditional techie, softcover
book, sit... | | Pro OpenGL ES for Android
In 1985 I brought home a new shiny Commodore Amiga 1000, about one week after
they were released. Coming with a whopping 512K of memory, programmable
colormaps, a Motorola 68K CPU, and a modern multitasking operating system, it had
“awesome” writ all over it. Metaphorically speaking, of course. I thought it might
make a... |
|
iPad 2: The Missing Manual
Apple announced the original iPad on January 27, 2010, and the
technology world hasn’t been the same since. Customers rushed
to buy the tablet, snapping up more than 300,000 the day it went
on sale. Competitors rushed to copy it, with Samsung, Motorola, Amazon,
and others creating their own variations on the app-friendly... | | Robot Builder's Bonanza, 4th Edition
Which of these fields are involved in robotics? You may choose from the following: engineering,
electronics, psychology, sociology, biology, physics, artificial intelligence, math, art,
mechanical design, mechanical construction, computer programming, sound synthesis, vision,
ultrasonics, linguistics, microelectronics, process control,... | | Inside Cyber Warfare: Mapping the Cyber Underworld
I was recently invited to participate in a cyber security dinner discussion by a few
members of a well-known Washington, DC, think tank. The idea was that we could
enjoy a fine wine and a delicious meal while allowing our hosts to pick our brains about
this “cyber warfare stuff.” It seems that the new ... |
|
Result Page: 39 38 37 36 35 34 33 32 31 30 |