Home | Amazing | Today | Tags | Publishers | Years | Search 
Audio Programming for Interactive Games
Audio Programming for Interactive Games
Martin Wilde explores the cutting-edge creative potential of game audio systems, addressing the latest working methods used in creating and programming immersive, interactive and non-linear audio for games. The book demonstrates how game programmers can create a software system enabling the audio content provider (composer or sound designer) to...
Absolute Beginner's Guide to Keynote for Mac OS X
Absolute Beginner's Guide to Keynote for Mac OS X
Priced at $99, Keynote is the new application that promises to bring to everyone the ability to create stunning, professional-quality presentations. It includes professionally designed themes, top-end typography, animated charts and tables, and cinematic quality transitions. Keynote has Apple's traditional elegance and ease-of-use, with intuitive...
OS X Exploits and Defense
OS X Exploits and Defense
Long believed to be a sanctuary of computer security, the Macintosh OS X operating system is increasingly under fire, making it as vulnerable to attack as Windows or Linux operating systems.

Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an
...
Excel Basics to Blackbelt: An Accelerated Guide to Decision Support Designs
Excel Basics to Blackbelt: An Accelerated Guide to Decision Support Designs
Excel Basics to Blackbelt is intended to serve as an accelerated guide to decision support designs. Its structure is designed to enhance the skills in Excel of those who have never used it for anything but possibly storing phone numbers, enabling them to reach to a level of mastery that will allow them to develop user interfaces and automated...
Mechanics of User Identification and Authentication: Fundamentals of Identity Management
Mechanics of User Identification and Authentication: Fundamentals of Identity Management
User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the security level of the authentication mechanism that they are using, and the potential impacts...
Mobile Robots: The Evolutionary Approach (Studies in Computational Intelligence)
Mobile Robots: The Evolutionary Approach (Studies in Computational Intelligence)
The design and control of autonomous intelligent mobile robotic systems operating in unstructured changing environments includes many objective difficulties. There are several studies about the ways in which, robots exhibiting some degree of autonomy, adapt themselves to fit in their environments. The application and use of bio-inspired and...
Wireless Networking (The Morgan Kaufmann Series in Networking)
Wireless Networking (The Morgan Kaufmann Series in Networking)
Convenient one-stop view of wireless networking including cellular networks, WiFi and WiMax, ad hoc networks, sensor networks, mesh networking, and the full range of options in between.

Over the past decade, the world has witnessed an explosion in the development and deployment of new wireless network technologies. From
...
Fast SOA: The way to use native XML technology to achieve Service Oriented Architecture governance, scalability, and performance
Fast SOA: The way to use native XML technology to achieve Service Oriented Architecture governance, scalability, and performance
FastSOA is a great book with lots of meat on the bones and practical real-world XML and SOA knowledge. Much of what passes for SOA right now is simply block diagrams and vague exhortations to get the architecture right. Frank Cohen gives a practical guide to what software developers, architects, and CIOs have to do to deliver highly scalable,...
Redesigning Enterprise Processes for E-Business w/CD ROM
Redesigning Enterprise Processes for E-Business w/CD ROM
This is the decade of redesigning enterprise processes for e-business ! Creating a process advantage has always been a formidable strategic weapon for business enterprises, but the internet and e-business have brought new urgency to it. A different form of business process redesign or reengineering (BPR) has been ignited by e-business to create...
How to Think About Algorithms
How to Think About Algorithms
There are many algorithm texts that provide lots of well-polished code and proofs of correctness. This book is not one of them. Instead, this book presents insights, notations, and analogies to help the novice describe and think about algorithms like an expert. By looking at both the big picture and easy step-by-step methods for developing...
Synthetic Fuels Handbook (McGraw-Hill Handbooks)
Synthetic Fuels Handbook (McGraw-Hill Handbooks)
Capitalize on the Vast Potential of Alternative Energy Sources Such as Fuel Cells and Biofuels

Synthetic Fuels Handbook is a comprehensive guide to the benefits and trade-offs of numerous alternative fuels, presenting expert analyses of the different properties, processes, and performance...

MoCap for Artists: Workflow and Techniques for Motion Capture
MoCap for Artists: Workflow and Techniques for Motion Capture
If anyone asks us “Do you think motion capture will replace key-frame animation?” we will say “No.”

Motion capture (mocap) is a very fast and accurate way to bring human motion into a 3D computer animation, but it is not always the best way. Mocap technology exhibits its remarkable strengths for some projects
...
Result Page: 811 810 809 808 807 806 805 804 803 802 801 800 799 798 797 796 795 794 793 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy