|
|
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
There are two kinds of cryptography in this world: cryptography that will stop your kid sister from
reading your files, and cryptography that will stop major governments from reading your files. This
book is about the latter.
If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the... | | Access Solutions: Tips, Tricks, and Secrets from Microsoft Access MVPs
Doug and I have known each other online for many years. We both became Microsoft
MVPs about 10 years ago, and have been friends ever since. Both of us had been writing
for magazines for years. Although we’d been talking about writing a book together
for about five years now, there had always been an impediment, usually work, and... | | Texturing and Modeling, Third Edition: A Procedural Approach
What is a realistic image? This is an age-old question in art, and a contemporary
question in computer graphics. This book provides a modern answer involving the
computer and a new definition of realism.
The classic definition of realism has been veridical realism. Does the picture pass
the comparison test? That is, would an... |
|
Game Programming Gems 8
Welcome to the eighth edition of the Game Programming Gems series, started by Mark DeLoura in 2000. The first edition was inspired by Andrew Glassner‘s popular Graphics Gems series. Since then, other Gems series have started, including AI Gems and a new series focused on the capabilities of programmable graphics, the ShaderX series.... | | Rendering HTML5 Illustration
Tags are used in HTML5 to place and organize content at a level
that is descriptive. This does not mean that the page will look
good. Presentation of content on the page is controlled using
Cascading Style Sheets Level 3, or CSS3, in HTML5.
There are times, however, when you need to present graphics,
too. Typically, HTML... | | Engineering a Compiler, Second Edition
The practice of compiler construction changes continually, in part because the designs of
processors and systems change. For example, when we began to write Engineering a Compiler
(eac) in 1998, some of our colleagues questioned the wisdom of including a chapter on
instruction scheduling because out-of-order execution threatened to make... |
|
ATM & MPLS Theory & Application: Foundations of Multi-Service Networking
Why did we decide to update this book on ATM once again? Mainly, because the publisher asked us to! Seriously, though, in the fast moving telecommunications industry, a lot has happened since the publication of the last edition in 1998. In case you have been asleep, Internet-based communication is clearly the killer application for... | | Web Design DeMYSTiFieD
When I started creating the outline for this book, I had just finished teaching a
semester-long web design course for a local community college. That experience
couldn’t have come at a better time because it helped me refine my approach to
teaching web design. I took my years of experience creating websites and writing
about... | | Algebra DeMYSTiFieD, Second Edition
Your SOLUTION to mastering ALGEBRA!
Trying to tackle algebra but nothing's adding up? No problem! Factor in Algebra Demystified, Second Edition and multiply your chances of learning this important branch of mathematics.
Written in a step-by-step format, this practical guide covers fractions, variables,... |
|
FPGA Design: Best Practices for Team-based Design
In August of 2006, an engineering VP from one of Altera’s customers approached
Misha Burich, VP of Engineering at Altera, asking for help in reliably being able to
predict the cost, schedule and quality of system designs reliant on FPGA designs.
At this time, I was responsible for defining the design flow requirements for... | | Design of Image Processing Embedded Systems Using Multidimensional Data Flow
With the availability of chips offering constantly increasing computational performance and
functionality, design of more and more complex applications becomes possible. This is particularly
true for the domain of image processing, which is characterized by huge computation
efforts. Unfortunately, this evolution risks to be stopped by... | | Django JavaScript Integration: AJAX and jQuery
In this book, we will be exploring Django JavaScript integration and build an Ajax application using jQuery. We will build a Web 2.0 intranet employee directory, and we will aim for a solution that is Pythonic in more ways than one.
Web development that is more "Pythonic" than just Python
This book is intended... |
|
Result Page: 1873 1872 1871 1870 1869 1868 1867 1866 1865 1864 1863 1862 1861 1860 1859 1858 1857 1856 1855 |