You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
The ubiquity of computer-generated imagery around us, in movies, advertising or on the Internet is already being taken for granted and what impresses most people is the photorealistic quality of the images. Pictures, as we have often been told, are worth a thousand words and the information transported by an image can take many different forms. Man
InfoWorld is targeted to Senior IT professionals. Content is segmented into Channels and Topic Centers. InfoWorld also celebrates people, companies, and projects.
The classic guide to UNIX® programming-completely updated! UNIX application programming requires a mastery of system-level services. Making sense of the many functions-more than 1,100 functions in the current UNIX specification-is a daunting task, so for years programmers have turned to Advanced UNIX Programming for its clear, expert advice on how to use the key functions reliably. An enormous number of changes have taken place in the UNIX environment since the landmark first edition. In Advanced UNIX Programming, Second Edition, UNIX pioneer Marc J. Rochkind brings the book fully up to date, with all-new, comprehensive coverage including: POSIX SolarisTM Linux® FreeBSD Darwin, the MacTM O...
Find an introduction to the architecture, concepts and algorithms of the Linux kernel in Professional Linux Kernel Architecture, a guide to the kernel sources and large number of connections among subsystems. Find an introduction to the relevant structures and functions exported by the kernel to userland, understand the theoretical and conceptual aspects of the Linux kernel and Unix derivatives, and gain a deeper understanding of the kernel. Learn how to reduce the vast amount of information contained in the kernel sources and obtain the skills necessary to understand the kernel sources.
InfoWorld is targeted to Senior IT professionals. Content is segmented into Channels and Topic Centers. InfoWorld also celebrates people, companies, and projects.
Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity--especially in this day of technologies that encroach upon these rights--still use Orwell's "Big Brother" language to discuss privacy issues. But the reality is that the age of a monolithic Big Brother is over. And yet the threats are perhaps even more likely to destroy the rights we've assumed were ours.Database Nation: The Death of Privacy in the 21st Century shows how, in these early years of the 21st century, advanc...
Kill It with Fire chronicles the challenges of dealing with aging computer systems, along with sound modernization strategies. How to survive a legacy apocalypse “Kill it with fire,” the typical first reaction to a legacy system falling into obsolescence, is a knee-jerk approach that often burns through tons of money and time only to result in a less efficient solution. This book offers a far more forgiving modernization framework, laying out smart value-add strategies and proven techniques that work equally well for ancient systems and brand-new ones. Renowned for restoring some of the world’s oldest, messiest computer networks to operational excellence, software engineering expert Ma...
"A Computational Approach to Digital Chinese Painting and Calligraphy" is a technical book on computer science and its applications in the arts. It focuses on Oriental digital arts, in particular Chinese arts and painting, offering a multi-disciplinary treatment from the angles of computer graphics, interactive techniques, human-computer interaction, and artificial intelligence. The book also discusses the unique difficulties and challenges of using the computer to produce Oriental arts, including research results by the authors and their lessons and engineering experiences behind these efforts. Songhua Xu is a computer scientist of Zhejiang University and Yale University, as well as an honorary researcher of the University of Hong Kong. Francis C.M. Lau is Professor at the University of Hong Kong where he leads the Systems Research Group in the Department of Computer Science. Yunhe Pan is Professor of Computer Science at Zhejiang University as well as Deputy President of Chinese Academy of Engineering.
This new edition of the hacker's own phenomenally successful lexicon includes more than 100 new entries and updates or revises 200 more. This new edition of the hacker's own phenomenally successful lexicon includes more than 100 new entries and updates or revises 200 more. Historically and etymologically richer than its predecessor, it supplies additional background on existing entries and clarifies the murky origins of several important jargon terms (overturning a few long-standing folk etymologies) while still retaining its high giggle value. Sample definition hacker n. [originally, someone who makes furniture with an axe] 1. A person who enjoys exploring the details of programmable system...