|
|
Going to War: Creating Computer War Games
Do you want to learn how to create computer war games, but don't know how to get started or don't have any experience with game programming? "Going to War: Creating Computer War Games" shows you how to use the drag-and-drop game engine, Multimedia Fusion 2, to make your very own computer war games to play and share. After an... | | Expert Systems: Principles and Programming, Third Edition
This book combines coverage of expert systems theory with coverage of practical applications using CLIPS, an expert systems shell widely used in government, industry, and education. The result is a self-contained book and CD-ROM package for computer science, engineering, and CIS/MIS students and professionals that provides the conceptual... | | David Busch's Canon Powershot G10/G11: Guide to Digital Photography
You don’t want good pictures from your new Canon PowerShot G10/G11—you demand outstanding photos. After all, the PowerShot G10 and G11 are the most pocketsized digital cameras that Canon has ever introduced. They boast 10 and 14 megapixels of resolution, blazing fast automatic focus, and a dozen and a half Special Scene modes that... |
|
Logic Pro 9 Power!: The Comprehensive Guide
LOGIC PRO 9 POWER! provides a complete introduction and reference for Logic Pro that covers the things that you are most likely to run into while using Logic to make music, using simple, thorough, and complete explanations. The book also explores why Logic works the way it does, so you'll not only learn the mechanics of how to do... | | Making Music with Mobile Devices
The iPhone, iPod Touch, Nintendo Gameboy, and handhelds like them are some of the are used by hundreds of millions of people around the world. Many of the people who use these devices are musicians that don’t know that they can use their handhelds to make and record music. This book offers both a survey of the available technologies,... | | Computer Crime, Investigation, and the Law
One can hardly open a newspaper or read news online without seeing another story about a computer-related crime. We are awash in identity theft, online child predators, and even cyber espionage. It seems overwhelming. And people in many different professions find themselves involved with computer-crime investigations. Obviously,... |
|
|
|
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 |