Miss Me This Christmas (2017) | Fear The Walking Dead Flight 462 Part 6-GHoSTCR3W | UFC Full Show
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Matrix Transforms for Computer Games and Animation
Matrix Transforms for Computer Games and Animation

Matrix transforms are ubiquitous within the world of computer graphics, where they have become an invaluable tool in a programmer’s toolkit for solving everything from 2D image scaling to 3D rotation about an arbitrary axis. Virtually every software system and hardware graphics processor uses matrices to undertake operations such as...

Security of e-Systems and Computer Networks
Security of e-Systems and Computer Networks
E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of...
The Fabulous Fibonacci Numbers
The Fabulous Fibonacci Numbers
"...delightful...accessible to anyone who enjoys or enjoyed high school mathematics. Mathematics teachers from middle school through college will find this book fun to read and useful in the classroom. The authors consider more properties, relationships, and applications of the Fibonacci numbers than most other sources do...I enjoyed reading...
Learning Robotics using Python
Learning Robotics using Python

Design, simulate, program, and prototype an interactive autonomous mobile robot from scratch with the help of Python, ROS, and Open-CV!

About This Book

  • Design, simulate, build and program an interactive autonomous mobile robot
  • Program Robot Operating System using Python
  • Get...
Pervasive Computing and Networking
Pervasive Computing and Networking

This book presents state-of-the-art research on architectures, algorithms, protocols and applications in pervasive computing and networks

With the widespread availability of wireless and mobile networking technologies and the expected convergence of ubiquitous computing with these emerging technologies in the near future,...

Queenpins: Notorious Women Gangsters of The Modern Era
Queenpins: Notorious Women Gangsters of The Modern Era

The cut throat world of organized crime has long been dominated by men, and such macho godfathers and kingpins as Al Capone, John Dillinger, Pablo Escobar and John Gotti have become legendary. Yet, dig deep into the annals of crime and one can find smart, ambitious and ruthless women who have cracked the glass ceiling of the underworld and...

ArcGIS for JavaScript developers by Example
ArcGIS for JavaScript developers by Example

Key Features

  • Unshackle your GIS application from a workstation! Get running with three major web mapping projects covering all the important aspects of the ArcGIS JavaScript API.
  • Set a strong foundation for the ArcGIS JavaScript API and modular coding with dojo.
  • Gain a crystal clear...
Information Warfare and Organizational Decision-Making
Information Warfare and Organizational Decision-Making
Organizations are among the most valuable and yet most fragile structures of our civilization. We rely on organizations to obtain information, to comprehend and process information, to accumulate and internalize information, to make decisions based in part on that information, and to execute those decisions. Organizations are ubiquitous because...
IQ: A Smart History of a Failed Idea
IQ: A Smart History of a Failed Idea

Advance praise for

IQ A Smart History of a Failed Idea

"An up-to-date, reader-friendly account of the continuing saga of the mismeasure of women and men."
—Howard Gardner, author of Frames of Mind and Multiple Intelligences: New Horizons

"The good news is that you won't be...

Designing the Internet of Things
Designing the Internet of Things

Take your idea from concept to production with this unique guide

Whether it's called physical computing, ubiquitous computing, or the Internet of Things, it's a hot topic in technology: how to channel your inner Steve Jobs and successfully combine hardware, embedded software, web services, electronics, and cool...

Java Closures and Lambda
Java Closures and Lambda
This book is the culmination of many brash years and hard lessons. The story starts all the way back when I migrated from C++ into perl. The perl programming language was amazingly powerful compared to the low-level manipulations and bookkeeping of C++. (The fact that it was “slow” never bothered me – I would rather write...
Pervasive Information Architecture: Designing Cross-Channel User Experiences
Pervasive Information Architecture: Designing Cross-Channel User Experiences

I knew the Internet before it got famous. There were places but no paths, no maps, no search engines. Entry required a key in the form of an IP address and an incantation in the language of UNIX. It was a small world that felt big because it was so easy to get lost in the shadowy realm of texts and data, completely devoid of color....

Result Page: 29 28 27 26 25 24 23 22 21 20 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy