Home | Amazing | Today | Tags | Publishers | Years | Search 
LEGO Software Power Tools, With LDraw, MLCad, and LPub
LEGO Software Power Tools, With LDraw, MLCad, and LPub

Create Virtual 3D LEGO Models Using LEGO Software Power Tools LEGO Master Builders have created a powerful set of tools that are distributed as freeware to the LEGO community to assist LEGO fans in their building adventures. Until now, these tools have been difficult to find, and even more difficult to configure to work with one another....

Security Risk Management: Building an Information Security Risk Management Program from the Ground Up
Security Risk Management: Building an Information Security Risk Management Program from the Ground Up

The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain...

10 Cool LEGO Mindstorms: Dark Side Robots, Transports, and Creatures: Amazing Projects You Can Build in Under an Hour
10 Cool LEGO Mindstorms: Dark Side Robots, Transports, and Creatures: Amazing Projects You Can Build in Under an Hour

LEGO MINDSTORMS let you design and program robots that can do just about anything!

The Dark Side Developer's Kit is targeted towards the young or novice LEGO MINDSTORMS designer, age 9 and up, although experienced MINDSTORMS fans will appreciate the unique possibilities offered by this kit as well. The Dark Side Developer's...

Computational Forensics: 4th International Workshop, IWCF 2010 Tokyo, Japan
Computational Forensics: 4th International Workshop, IWCF 2010 Tokyo, Japan

This Lecture Notes in Computer Science (LNCS) volume contains the papers presented at the International Workshop on Computational Forensics (IWCF 2010), held in Tokyo, Japan during November 11–12, 2010. The workshop took place in conjunction with the 16th Annual Scientific Meeting of the Japanese Association of Forensic Science.

...
Computer Vision - ACCV 2010: 10th Asian Conference on Computer Vision, Queenstown, New Zealand
Computer Vision - ACCV 2010: 10th Asian Conference on Computer Vision, Queenstown, New Zealand

The 2010 Asian Conference on Computer Vision took place in the southern hemisphere, in “The Land of the Long White Cloud” in Maori language, also known as New Zealand, in the beautiful town of Queenstown. If we try to segment the world we realize that New Zealand does not belong officially to any continent. Similarly, in computer...

Continuous Integration in .NET
Continuous Integration in .NET

After completing my master’s degree, I moved from Poland to Germany and began working as a .NET developer for a company full of experts in … Clarion. The Clarion folks were developing the company’s flagship—very successful leasing software—and I was left to do “the rest”: a bit of...

The RSpec Book: Behaviour Driven Development with Rspec, Cucumber, and Friends (The Facets of Ruby Series)
The RSpec Book: Behaviour Driven Development with Rspec, Cucumber, and Friends (The Facets of Ruby Series)

You'll get started right away with RSpec 2 and Cucumber by developing a simple game, using Cucumber to express high-level requirements in language your customer understands, and RSpec to express more granular requirements that focus on the behavior of individual objects in the system. You'll learn how to use test doubles...

Oracle Siebel CRM 8 Developer's Handbook
Oracle Siebel CRM 8 Developer's Handbook

Siebel CRM, Oracles' market-leading Customer Relationship Management software, can be tailored to customers needs. In this book, the ambitious developer will learn how to safely implement customer requirements in Siebel CRM using Siebel Tools, Siebel's own integrated development environment.

This book is a complete...

Video Game Optimization
Video Game Optimization

Optimizing is a game of trade-offs.

There are many anecdotes, articles, and books about optimizing in specific scenarios. Sometimes, these include hard numbers; if so, it’s usually for hardware that is several years old. Often, the discussion is very specific, such as optimizing memory copies for a specific chip, and the...

Digital Forensics with Open Source Tools
Digital Forensics with Open Source Tools

Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. Both well known and novel forensic...

Web and Wireless Geographical Information Systems: 10th International Symposium
Web and Wireless Geographical Information Systems: 10th International Symposium

Continuing advances in the development of wireless and Internet technologies generate ever increasing interest in the diffusion, usage, and processing of georeferenced data of all types. Spatially-aware wireless and Internet devices also offer new ways of accessing and analyzing geo-spatial information in both realworld and virtual spaces....

Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 201
Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 201

The RSA conference was initiated in 1991 and is a major international event for cryptography and information security researchers as well as the industry related to these disciplines. It is an annual event that attracts hundreds of vendors and thousands of participants from industry and academia. Since 2001, the RSA conference has included...

Result Page: 1825 1824 1823 1822 1821 1820 1819 1818 1817 1816 1815 1814 1813 1812 1811 1810 1809 1808 1807 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy