Home | Amazing | Today | Tags | Publishers | Years | Search 
Lactoferrin:  Natural - Multifunctional - Antimicrobial
Lactoferrin: Natural - Multifunctional - Antimicrobial

Illnesses resulting from foodborne pathogens occur at least 6 million times each year and cause an estimated 9,000 deaths. For decades, food microbiologists have developed various effective methods of food protection. However, the constant development of multi-facet food processing technologies and the emergence of potent foodborne pathogens,...

Calculus for Computer Graphics
Calculus for Computer Graphics

Students studying computer animation and computer games have to be familiar with geometry, matrices, vectors, rotation transforms, quaternions, curves and surfaces, and as computer graphics software becomes increasingly sophisticated, calculus is also being used to resolve its associated problems.

The author draws upon his...

Folding Techniques for Designers: From Sheet to Form
Folding Techniques for Designers: From Sheet to Form

Many designers use folding techniques in their work to make three-dimensional forms from two-dimensional sheets of fabric, cardboard, plastic, metal, and many other materials. This unique book explains the key techniques of folding, such as pleated surfaces, curved folding and crumpling. An elegant, practical handbook, it covers over 70...

Blender For Dummies
Blender For Dummies

Learn 3D animation the easy way with this complete step-by-step guide

Blender For Dummies is the quick and easy guide to learning 3D modeling and animation using the popular, free, open source Blender software. You'll learn how to create models, animate movement, and render well-lit scenes as you master...

Genetic Algorithms in Electromagnetics
Genetic Algorithms in Electromagnetics
A thorough and insightful introduction to using genetic algorithms to optimize electromagnetic systems

Genetic Algorithms in Electromagnetics focuses on optimizing the objective function when a computer algorithm, analytical model, or experimental result describes the performance of an electromagnetic system. It...

Real-Time 3D Graphics with WebGL 2: Build interactive 3D applications with JavaScript and WebGL 2 (OpenGL ES 3.0), 2nd Edition
Real-Time 3D Graphics with WebGL 2: Build interactive 3D applications with JavaScript and WebGL 2 (OpenGL ES 3.0), 2nd Edition
A comprehensive guide with 80+ examples on 3D programming in WebGL2, covering computer graphics topics such as rendering, 3D math, cameras, and more.

Key Features:
  • Create visually stunning, high-performance 3D applications for the web with WebGL 2
  • ...
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition

Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security

Key Features

  • Familiarize yourself with the most common web vulnerabilities
  • Conduct a preliminary assessment of attack surfaces and run exploits in your lab
  • ...
Learn ARCore - Fundamentals of Google ARCore: Learn to build augmented reality apps for Android, Unity, and the web with Google ARCore 1.0
Learn ARCore - Fundamentals of Google ARCore: Learn to build augmented reality apps for Android, Unity, and the web with Google ARCore 1.0

Create next-generation Augmented Reality and Mixed Reality apps with the latest version of Google ARCore

Key Features

  • Harness the power of the Google's new augmented reality (AR) platform ARCore to build cutting-edge Augmented reality apps
  • Learn core concepts of...
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Computational Linguistics and Talking Robots: Processing Content in Database Semantics
Computational Linguistics and Talking Robots: Processing Content in Database Semantics

The practical task of building a talking robot requires a theory of how natural language communication works. Conversely, the best way to computationally verify a theory of natural language communication is to demonstrate its functioning concretely in the form of a talking robot, the epitome of human–machine communication. To...

Shoot Macro: Professional Macrophotography Techniques for Exceptional Studio Images
Shoot Macro: Professional Macrophotography Techniques for Exceptional Studio Images
Few areas of photography require the level of unwavering technical expertise required for successful macrophotography. When you’re shooting very big images of very small subjects, even tiny flaws—be it in the lighting, composition, focusing, or any other aspect of the process—can result in unusable images. In this...
Transformation Processes of Metals in Urban Road Dust: Implications for Stormwater Reuse (SpringerBriefs in Water Science and Technology)
Transformation Processes of Metals in Urban Road Dust: Implications for Stormwater Reuse (SpringerBriefs in Water Science and Technology)
This book discusses the physicochemical changes (transformations) that metals deposited on urban road surfaces undergo during dry weather periods, in order to provide insights into their potential impacts on stormwater quality. Based on extensive field experiments, and laboratory and data analyses, it examines transformation characteristics of...
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy