Advances in Multimedia Modeling
This book constitutes the refereed proceedings of the 14th International Multimedia Modeling Conference, MMM 2007, held in Kyoto, Japan, in January 2007. The 23 revised full papers and 24 revised...
View Article3D Graphics for Game Programming
Designed for advanced undergraduate and beginning graduate courses, this book presents must-know information for success in interactive graphics. Assuming a minimal prerequisite understanding of...
View ArticleMagicka: The Other Side of the Coin (2012/ENG/Ali213)
Magicka: The Other Side of the Coin the third addition to the action Magicka, allowing players to play the role of vampire Alukarta and necromancers in the battle against the bloodsucker Vlad. Victory...
View ArticleDynamics, Games and Science II
Dynamics, Games and Science I and II are a selection of surveys and research articles written by leading researchers in mathematics. The majority of the contributions are on dynamical systems and game...
View ArticleThe Story of Google By Adam Sutherland
The astounding rise and influence of Google, the most successful company in history, is documented in this engaging volume. Readers will learn from Google’s corporate motto, “Don’t be evil,” that big...
View ArticleSecurityTube Metasploit Framework Expert
The SecurityTube Metasploit Framework Expert (SMFE) is an online certification on the Metasploit Framework. This course is ideal for penetration testers, security enthusiasts and network...
View ArticleCisco Unity Connection (Networking Technology: IP Communications) By David...
Cisco Unity Connection presents all the concepts and techniques you need to successfully plan, design, implement, and maintain Cisco Unity Connection voice messaging systems. For every stage of the...
View ArticleProgramming Game AI by Example
This book describes in detail many of the AI techniques used in modern computer games, explicity shows how to implement these practical techniques within the framework of several game developers with a...
View ArticleProfessional Android 2 – Application Development
Written by an Android authority, this up-to-date resource shows you how to leverage the features of Android 2 to enhance existing products or create innovative new ones. Serving as a hands-on guide to...
View ArticleThe Tao of Network Security Monitoring
Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep...
View ArticleComplicated Watches and Their Repair
Dealing with a complicated watch used to be a rare job for the watch repairer, but with the popularity of the automatic, it is almost commonplace. Furthermore, the increased interest in calendar work,...
View ArticleCisco Routers for the Desperate: Router and Switch Management, the Easy Way...
Cisco routers and switches are the cornerstones of many networks. But when things break, repairs can intimidate even the most competent administrator. Luckily, just knowing the “in case of emergency”...
View ArticleMagicka: The Other Side of the Coin (2012/ENG/Ali213)
Magicka: The Other Side of the Coin the third addition to the action Magicka, allowing players to play the role of vampire Alukarta and necromancers in the battle against the bloodsucker Vlad. Victory...
View ArticleDynamics, Games and Science II
Dynamics, Games and Science I and II are a selection of surveys and research articles written by leading researchers in mathematics. The majority of the contributions are on dynamical systems and game...
View ArticleThe Story of Google By Adam Sutherland
The astounding rise and influence of Google, the most successful company in history, is documented in this engaging volume. Readers will learn from Google’s corporate motto, “Don’t be evil,” that big...
View ArticleSecurityTube Metasploit Framework Expert
The SecurityTube Metasploit Framework Expert (SMFE) is an online certification on the Metasploit Framework. This course is ideal for penetration testers, security enthusiasts and network...
View ArticleCisco Unity Connection (Networking Technology: IP Communications) By David...
Cisco Unity Connection presents all the concepts and techniques you need to successfully plan, design, implement, and maintain Cisco Unity Connection voice messaging systems. For every stage of the...
View ArticleProgramming Game AI by Example
This book describes in detail many of the AI techniques used in modern computer games, explicity shows how to implement these practical techniques within the framework of several game developers with a...
View ArticleProfessional Android 2 – Application Development
Written by an Android authority, this up-to-date resource shows you how to leverage the features of Android 2 to enhance existing products or create innovative new ones. Serving as a hands-on guide to...
View ArticleThe Tao of Network Security Monitoring
Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep...
View Article
More Pages to Explore .....