Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Lightwave 3D Character Animation
Lightwave 3D Character Animation
This book is for anyone who has ever had a character in their heart that they’ve wanted to bring to life with as much fluidity, power, and grace as can be seen in the best animated feature films. This is a book for anyone who has wanted to become an animator but hasn’t gone to Sheridan College in Toronto or CalArts in Valencia. This is...
3D Game Programming All in One
3D Game Programming All in One
Are you an aspiring game developer with a great idea, but no practical knowledge for turning that idea into reality? 3D Game Programming All in One is the comprehensive guide you need! This new edition updates the original coverage with the latest version of Torque from GarageGames, and provides the very best tools available to the Indie game...
Dyke Swarms of the World: A Modern Perspective (Springer Geology)
Dyke Swarms of the World: A Modern Perspective (Springer Geology)

Continuing the tradition of International Dyke Conference, this book is largely based on contributions from the IDC7 but also includes some chapters by invitation. It focuses on mafic dyke swarms and related associations: e.g. links with sills, kimberlites, syenites, carbonatites, and volcanics, discussing the following themes: (i)...

Architects of Intelligence: The truth about AI from the people building it
Architects of Intelligence: The truth about AI from the people building it

Financial Times Best Books of the Year 2018

TechRepublic Top Books Every Techie Should Read

Book Description

How will AI evolve and what major innovations are on the horizon? What will its impact be on the job market, economy, and society? What is the path toward human-level...

Understanding DB2 9 Security
Understanding DB2 9 Security
Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world...
Java(tm) for S/390® and AS/400® COBOL Programmers
Java(tm) for S/390® and AS/400® COBOL Programmers
Written by mainframe and midrange professionals George Farr and Phil Coulthard, Java for S/390 & AS/400 COBOL Programmers is designed to help COBOL programmers make the jump to Java. It teaches COBOL programmers how to read and write Java programs and helps them understand the concepts necessary to continue to improve their Java skills. Rather...
Understanding the IBM WebFacing Tool: A Guided Tour (IBM Illustrated Guide series)
Understanding the IBM WebFacing Tool: A Guided Tour (IBM Illustrated Guide series)
Written for IBM eServer iSeries programmers responsible for converting applications to a web-based interface, this book takes users through WebFacing a sample green screen application using IBM WebSphere Development Studio Client. How to use the different features of the tool to enhance the application after the initial conversion is demonstrated,...
How to Think About Algorithms
How to Think About Algorithms
There are many algorithm texts that provide lots of well-polished code and proofs of correctness. This book is not one of them. Instead, this book presents insights, notations, and analogies to help the novice describe and think about algorithms like an expert. By looking at both the big picture and easy step-by-step methods for developing...
Disappearing Cryptography, Second Edition - Information Hiding: Steganography and Watermarking
Disappearing Cryptography, Second Edition - Information Hiding: Steganography and Watermarking
"Disappearing Cryptography is a witty and entertaining look at the world of information hiding. Peter Wayner provides an intuitive perspective of the many techniques, applications, and research directions in the area of steganography. The sheer breadth of topics is outstanding and makes this book truly unique. A must read for...
Access Denied: The Practice and Policy of Global Internet Filtering (Information Revolution and Global Politics)
Access Denied: The Practice and Policy of Global Internet Filtering (Information Revolution and Global Politics)
This book is a testament to collaboration. About five years ago, it became clear to several of us—at the University of Cambridge, Harvard Law School, and the University of Toronto—that we might accomplish more by working together, across institutions and continents, than we could by going it alone. Since that time, the Oxford Internet...
Computer Vision Systems: 8th International Conference, ICVS 2011, Sophia Antipolis, France, September 20-22, 2011, Proceedings
Computer Vision Systems: 8th International Conference, ICVS 2011, Sophia Antipolis, France, September 20-22, 2011, Proceedings
Computer Vision is the science and technology of machines that see. The dominant scientific conferences in computer vision, such as ICCV, CVPR and ECCV, concentrate on theories and models for obtaining information from images and image sequences. The intensely competitive nature of these conferences leaves little room to...
Intelligent Image Processing
Intelligent Image Processing
Intelligent Image Processing describes the EyeTap technology that allows non-invasive tapping into the human eye through devices built into eyeglass frames. This isn't merely about a computer screen inside eyeglasses, but rather the ability to have a shared telepathic experience among viewers. Written by the developer of the EyeTap principle, this...
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy