 |
|
|
 Complex Variables and the Laplace Transform for Engineers
Widely acclaimed text on essential engineering mathematics. Theory of complex variables, Cauchy-Riemann equations, conformal mapping, multivalued functions, etc. Also Fourier and Laplace Transform theory, its applications to engineering, including integrals, linear integrodifferential equations, Z Transform, much more. Many excellent... |  |  Image and Geometry Processing for 3-D Cinematography (Geometry and Computing)
The book presents an overview of 3-D cinematography, the science and technology of generating 3-D models of dynamic scenes from multiple cameras at video frame rates. The book covers recent developments in computer vision and computer graphics that have made 3-D cinematography possible, and reviews the challenges and open issues that need to... |  |  Documentum 6.5 Content Management Foundations
EMC Documentum is a leading Enterprise Content Management technology platform that helps enterprises to streamline the capture, processing, and distribution of business information including documents, records, e-mails, web content, images, reports, and digital assets. EMC Proven Professional is an exam-based certification program, which... |
|
 Logic Pro 9 Power!: The Comprehensive Guide
LOGIC PRO 9 POWER! provides a complete introduction and reference for Logic Pro that covers the things that you are most likely to run into while using Logic to make music, using simple, thorough, and complete explanations. The book also explores why Logic works the way it does, so you'll not only learn the mechanics of how to do... |  |  Making Music with Mobile Devices
The iPhone, iPod Touch, Nintendo Gameboy, and handhelds like them are some of the are used by hundreds of millions of people around the world. Many of the people who use these devices are musicians that don’t know that they can use their handhelds to make and record music. This book offers both a survey of the available technologies,... |  |  Computer Crime, Investigation, and the Law
One can hardly open a newspaper or read news online without seeing another story about a computer-related crime. We are awash in identity theft, online child predators, and even cyber espionage. It seems overwhelming. And people in many different professions find themselves involved with computer-crime investigations. Obviously,... |
|
|
| Result Page: 681 680 679 678 677 676 675 674 673 672 671 670 669 668 667 666 665 664 663 |