|
|
|
|
|
Network Forensics: Tracking Hackers through Cyberspace
My great-grandfather was a furniture maker. I am writing this on his table, sitting in his
chair. His world was one of craft, “the skilled practice of a practical occupation.”1 He made
furniture late in life that was in superficial respects the same as that which he made earlier,
but one can see his craft advance.
... | | Computer Vision: A Modern Approach (2nd Edition)
Computer vision as a field is an intellectual frontier. Like any frontier, it is
exciting and disorganized, and there is often no reliable authority to appeal to.
Many useful ideas have no theoretical grounding, and some theories are useless
in practice; developed areas are widely scattered, and ... | | Core HTML5 Canvas: Graphics, Animation, and Game Development (Core Series)
In the summer of 2001, after 15 years of developing graphical user interfaces and
graphics-intensive applications, I read a best-selling book about implementing
web applications by someone I did not know—Jason Hunter—but whom, unbeknownst
to me, would soon become a good friend on the No Fluff Just Stuff
(NFJS) tour.... |
|
Result Page: 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 |