|
|
Blender 3D Cookbook
Build your very own stunning characters in Blender from scratch
About This Book
-
Establish the basic shape of a character with the help of templates, and complete it by using different Blender tools
-
Gain an understanding of how to create and assign materials automatically, working in both...
| | Enterprise Mac Administrators Guide
IT departments everywhere will be integrating Macs and Mac OS X into their IT infrastructure and this book will tell them how to do it. It will serve as an authoritative, useful and frequently referenced book on Mac OS X administration. ... | | Group Policy: Fundamentals, Security, and the Managed Desktop
Get up to speed on the latest Group Policy tools, features, and best practices
Group Policy, Fundamentals, Security, and the Managed Desktop, 3rd Edition helps you streamline Windows and Windows Server management using the latest Group Policy tools and techniques. This updated edition covers Windows 10... |
|
Hospital Images: A Clinical Atlas
This gorgeous, full-color atlas and case-book presents more than sixty cases with over one hundred associated, super high-quality clinical images that a physician needs to be able to rapidly recognize and know for accurate, expedient diagnosis and treatment. The images are presented with the patient’s brief medical history, followed by... | | The Science of Solar System Ices (Astrophysics and Space Science Library)
The role of laboratory research and simulations in advancing our understanding of solar system ices (including satellites, KBOs, comets, and giant planets) is becoming increasingly important. Understanding ice surface radiation processing, particle and radiation penetration depths, surface and subsurface chemistry, morphology, phases,... | | Next Generation Red Teaming
Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of the Red Team is to see how weak or otherwise the organization’s security posture is. This course is particularly suited to CISO’s and CTO’s... |
|
|
|
Result Page: Previous 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 Next |