Kinect最早運用在Xbox 360的體感遊戲上,讓玩家能夠用自己的身體操作遊戲,不再受到遊戲控制器的束縛。Kinect for Xbox受到市場廣大迴響,微軟趁勝追擊,推出Kinect for Windows硬體,促使Kinect脫離遊樂器專用的範疇,開發人員得以將Kinect與各種PC結合,發展出更多應用。接下來,功能更強大的Kinect One即將面市,以更精確的感測技術與演算法繼續引領體
Kinect 是微軟公司推出的最新的基於體感交互的人機交互設備。本書分為3 個部分,首先介紹了Kinect 的結構和功能以及如何配置相關的開發環境,接著結合實例介紹如何使用Kinect for Windows SDK 提供的API,最後通過4 個實例詳細講述了使用Kinect for Windows SDK 開發專案的實現過程。本書旨在為Kinect for Windows 開發人員提供快速入門的
From the best-selling co-authors of the world-renowned book,Hacking Exposed,comes Hacking Windows 2000 Exposed. You'll learn,step-by-step,how to defend against the latest attacks by understanding how
Secure Your Wireless Networks the Hacking Exposed WayDefend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume
Written in the same exciting and informative style as the international blockbuster "Hacking Exposed, this book provides comprehensive coverage of the tools and techniques for testing and correcting J
Implement bulletproof e-business security the proven Hacking Exposed way Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully
"“The seminal book on white-hat hacking and countermeasures... Should be required reading for anyone with a server or a network to secure.” --Bill Machrone, PC Magazine""The definitive compendium of i
Analyze your company’s vulnerability to hacks with expert guidance from Gray Hat Hacking: The Ethical Hacker’s Handbook. Discover advanced security tools and techniques such as fuzzing, reverse engine
"""The most demystifying source of information since Toto exposed the Wizard. Hacking Exposed Windows Server 2003 eliminates the mystique and levels the playing field by revealing the science behind t
Hacking Exposed: Network Security Secrets and Solutions is written for network administrators who want to learn the tools and trade of computer hackers, so they can defend their businesses against the
For over a decade, Andrew "bunnie" Huang, one of the world's most esteemed hackers, has shaped the fields of hacking and hardware, from his cult-classic book Hacking the Xbox to the open-source laptop
Get in-depth coverage of Web application platforms and their vulnerabilities, presented the same popular format as the international bestseller, "Hacking Exposed." Covering hacking scenarios across di
Bob Howard’s career in the Laundry, the secret British government agency dedicated to protecting the world from unspeakable horrors from beyond spacetime, has entailed high combat, brilliant hacking,
"In Hacking Happiness, futurist and contributing Mashable writer John C. Havens introduces you to your "quantified self"-your digital identity represented by gigabytes of data produced from tracking y
OFFICIAL CERTIFIED ETHICAL HACKER REVIEW GUIDE: FOR VERSION 7.1 is a valuable resource to help you pursue the most recognized, respected hacking certification in the world. As experienced instructors
Bulletproof your system before you are hacked! From the publisher of the international best-seller, Hacking Exposed, here is a brilliant new offering written with a passion for security that will help
Here's the quickest means to network security. Information systems security consultant Mike Horton provides trustworthy tips to help IT professionals deliver ready-made hacking and security architectu
Believing they have been recruited by the CIA, six teen hackers arrive in LA for a hacking aptitude test with the promise of a college scholarship and a job with the CIA after graduation. But one of t
FRAME-UP Someone has framed Darci Tucker for embezzlementand she's pretty sure it's her boss. The real criminal will do anything to make sure she doesn't talk, from breaking into her home to hacking h
Hacking just got sweeter.Massive sweets craving and only your cabinets to scavenge? Friends coming by at the last minute to pre-party and you can’t run to the store? Have no fear, hacks are here. Raid
“Cadel rides right up there with Artemis Fowl as a sympathetic anti-villain.”–Kirkus Reviews, starred review Cadel Piggot has a genius IQ. He’s caught hacking into government databases at the age of s
本書為哲學家 IAN HACKING於2007年底來台訪問時於台大、清華、東吳等大學所發表四場演講的講稿。四章內容有其相通之處,即是從各個面向來討論基本的科學哲學問題:什麼是「真實」?什麼是理性?科學概念是否是真實的? HACKING以CROMBIE所創的「科學思考方式」為論證跳板,再次檢視、討論基本科學哲學問題。
Let consultant, trainer, and author Mike Shema show you how to guard against standard and uncommon network penetration methodologies and eliminate susceptibility to e-commerce hacking. Plus, learn to
Find out if you have what it takes to keep the bad guys out of your network. This real-world resource contains 20+ hacking challenges for you to solve. Plus, you'll get in-depth solutions for each, a
珍妮佛:「是誰讓裝在袋子裡的貓跑出來的?(Who let the cat out of the bag?)」珍妮佛說著說著,嘴巴裡起了泡沫(foam at the mouth)。「哼!是哪個只有荷蘭人勇氣(Dutch courage)的膽小鬼說的啊!傑克,快承認吧!我可是有來自馬嘴的消息(from the horse’s mouth)喔!」 傑克:「想逼我吃下烏鴉(eat crow)!門都沒有!
《建國方略》是孫文於1917年至1920年期間完成的3本著作的合訂本。它們分別是: (1)心理建設 《孫文學說》於 1919年完稿;(2)物質建設 《實業計畫》 原以英文發表,於1920年完稿,1921年出中文本並加序,英文本名為《The International Development of China》;(3)社會建設《民權初步》 於1917年完稿,原名《會議通則》。
"A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in." --Bruce Potter, Founder, The Shmoo Group"Very highly recommended whether you are a seasoned prof
New and Updated Material: * Each part opens with a brand new case study based on real security scenarios * Brand new chapter covers the latest 802.11 Wireless networking security attacks and counter