IMIST


Votre recherche a retourné 8 résultats.

Complete maya programming volume ii an in-depth guide to 3d fundamentals, geometry, and modeling Volume 2 : par Gould, David. Publication : [S.l.] Morgan Kaufmann, 2005 . 744 p. , David Gould's acclaimed first book, Complete Maya Programming: An Extensive Guide to MEL and the C++ API , provides artists and programmers with a deep understanding of the way Maya works and how it can be enhanced and customized through programming. In his new book David offers a gentle, intuitive introduction to the core ideas of computer graphics. Each concept is explained progressively and is fully implemented in both MEL and C++ so that an artist or programmer can use the source code directly in their own programs. Geometry and modeling are covered in detail with progressively more complex examples demonstrating all of Maya's possible programming features. David Gould's first volume is widely regarded as the most authoritative reference on Maya programming. Volume II continues this tradition and provides an unmatched guide for the artist and programmer tackling complex tasks. * Covers a spectrum of topics in computer graphics including points and vectors, rotations, transformations, curves and surfaces (polygonal, NURBS, subdivision), and modeling. * Offers insights to Maya's inner workings so that an artist or programmer can design and develop customized tools and solutions. * Discusses problem solving with MEL (Maya's scripting language) and the more powerful and versatile C++ API, with plenty of code examples for each. 24 cm. Date : 2005 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Reversing secrets of reverse engineering par Eilam, Eldad. Publication : [S.l.] Wiley 2005 . 624 pages , Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. * The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products * Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware * Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language. 24 cm. Date : 2005 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (2),

Deploying IP and MPLS QoS for multiservice networks : theory and practice / par Evans, John. Publication : . 1 online resource (xxiii, 431 pages) : Disponibilité :  http://www.sciencedirect.com/science/book/9780123705495,

Computer busses design and application / par Buchanan, William. Publication : . 1 online resource (xiv, 608 pages) : Disponibilité :  http://www.sciencedirect.com/science/book/9780340740767,

Vous ne trouvez pas ce que vous cherchez ?
© Tous droits résérvés IMIST/CNRST
Angle Av. Allal Al Fassi et Av. des FAR, Hay Ryad, BP 8027, 10102 Rabat, Maroc
Tél:(+212) 05 37.56.98.00
CNRST / IMIST

Propulsé par Koha