|
|
|
|
Going to War: Creating Computer War Games
Do you want to learn how to create computer war games, but don't know how to get started or don't have any experience with game programming? "Going to War: Creating Computer War Games" shows you how to use the drag-and-drop game engine, Multimedia Fusion 2, to make your very own computer war games to play and share. After an... | | The Truth About Being a Leader
Praise for The Truth About Being a Leader
“If you ever met Dr. Otazo, you certainly would read her new Truth book. She is as she writes—engaging, pithy, memorable. Take ‘Truth 33: Questions Unite; Answers Divide.’ Now ain’t that the truth.... | | OpenGL ES 3.0 Programming Guide (2nd Edition)
OpenGL® ES™ is the industry’s leading software interface and graphics library for rendering sophisticated 3D graphics on handheld and embedded devices. The newest version, OpenGL ES 3.0, makes it possible to create stunning visuals for new games and apps, without compromising device performance or... |
|
Air Pollution Modeling and its Application XV (v. 15)
This volume contains the papers and poster abstracts presented at the 25th NATO/CCMS International Technical Meeting on Air Pollution Modelling and Its Application held in Louvain-la-Neuve, Belgium, during 15-19 October 2001. This ITM was jointly organized by the University of Aveiro, Portugal (Pilot country) and by the Catholic University of... | | Linux Administration Handbook (2nd Edition)As the deployment of Linux systems in production environments has accelerated, Linux administrators have longed for a book that addresses the challenges of this complex and exciting frontier. Linux Administration Handbook was written with this audience in mind. This book serves both as a valuable tutorial for the novice administrator and as a... | | Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great... |
|
|
|
|
Result Page: 9 8 7 6 5 4 3 2 1 |