Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Blender 2.5 Lighting and Rendering
Blender 2.5 Lighting and Rendering

Each chapter develops a different aspect of a Blender technique. The book is essentially a step-by-step tutorial, which builds up your knowledge throughout. It has practical examples such as lighting a tricycle in open space, lighting a wine bottle on a table, and lighting a room that has a lamp as well as sunlight coming in through the...

Protecting Your Mobile App IP: The Mini Missing Manual
Protecting Your Mobile App IP: The Mini Missing Manual

Learn four cost-effective ways to protect the applications you develop for mobile devices. The methods described in this Mini Missing Manual won't stop people from misappropriating your secrets, stealing your name, and copying your code. But if any of those things do...

Mobile Positioning and Tracking: From Conventional to Cooperative Techniques
Mobile Positioning and Tracking: From Conventional to Cooperative Techniques

This book presents the most recent state of the art in mobile positioning and tracking techniques.

This book discusses mobile positioning solutions applied on top of current wireless communication networks. In addition, the authors introduce advanced and novel topics such as localization in heterogeneous and cooperative...

Computer and Information Sciences: Proceedings of the 25th International Symposium on Computer and Information Sciences
Computer and Information Sciences: Proceedings of the 25th International Symposium on Computer and Information Sciences

Computer and Information Sciences is a unique and comprehensive review of advanced technology and research in the field of Information Technology. It provides an up to date snapshot of research in Europe and the Far East (Hong Kong, Japan and China) in the most active areas of information technology, including Computer Vision, Data...

Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)

Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.

The Information Security...

Writing for Digital Media
Writing for Digital Media
In the digital age, we are all consumers and producers, readers and publishers alike. The Internet has made it possible for anyone to publish his or her writing online almost instantaneously for all the world to read.

The evolution of digital media has introduced both unprecedented challenges and opportunities for
...
Digital Transmission: A Simulation-Aided Introduction with VisSim/Comm (Signals and Communication Technology)
Digital Transmission: A Simulation-Aided Introduction with VisSim/Comm (Signals and Communication Technology)

Digital Transmission – A Simulation-Aided Introduction with VisSim/Comm is a book in which basic principles of digital communication, mainly pertaining to the physical layer, are emphasized. Nevertheless, these principles can serve as the fundamentals that will help the reader to understand more advanced topics and the associated...

Investing Without Borders: How Six Billion Investors Can Find Profits in the Global Economy
Investing Without Borders: How Six Billion Investors Can Find Profits in the Global Economy

An insightful examination of the skills needed to be a proactive investor and find diverse investment opportunities in the emerging economy

There is no little league on Wall Street and no white belts. Here or abroad, you are put in immediately with the black belts – the best and the brightest. Think like an amateur and they...

Introducing Silverlight 4
Introducing Silverlight 4

Introducing Silverlight 4 brings you up to speed with the latest version of Silverlight quickly and efficiently. The book builds off your understanding of the basics of .NET coding and WPF, allowing your journey to Silverlight 4 proficiency to be as quick and painless as possible. The text highlights where coding techniques are...

Programming Windows Identity Foundation (Dev - Pro)
Programming Windows Identity Foundation (Dev - Pro)

A few years ago, I was sitting at a table playing a game of poker with a few colleagues from Microsoft who had all been involved at various times in the development of Web Services Enhancements for Microsoft .NET (WSE). Don Box, Mark Fussell, Kirill Gavrylyuk, and I played the hands while showman extraordinaire Doug Purdy engaged us with...

WordPress For Dummies, 3rd Edition
WordPress For Dummies, 3rd Edition

The bestselling guide to WordPress, fully updated for newest version of WordPress

WordPress, the popular, free blogging platform, has been updated with new features and improvements. Bloggers who are new to WordPress will learn to take full advantage of its flexibility and usability with the advice in this friendly guide.

...

Statistical Analysis with R
Statistical Analysis with R

This is a practical, step by step guide that will help you to quickly become proficient in the data analysis using R. The book is packed with clear examples, screenshots, and code to carry on your data analysis without any hurdle. If you are a data analyst, business or information technology professional, student, educator, researcher, or...

Result Page: Previous 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 Next 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy