The complete business process handbook . Volume I : body of knowledge from process modeling to bpm / / Mark von Rosing, August-Wilhelm Scheer, Henrik von Scheel |
Autore | Rosing Mark Von |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Morgan Kaufmann, , 2015 |
Descrizione fisica | 1 online resource (813 pages) : illustrations |
Disciplina | 658.5 |
Soggetto topico |
Process control
Management information systems |
Soggetto genere / forma | Electronic books. |
ISBN |
0-12-799959-0
0-12-800472-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910463807403321 |
Rosing Mark Von | ||
Waltham, Massachusetts : , : Morgan Kaufmann, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The complete business process handbook . Volume I : body of knowledge from process modeling to bpm / / Mark von Rosing, August-Wilhelm Scheer, Henrik von Scheel |
Autore | Rosing Mark Von |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Morgan Kaufmann, , 2015 |
Descrizione fisica | 1 online resource (813 pages) : illustrations |
Disciplina | 658.5 |
Soggetto topico |
Process control
Management information systems |
ISBN |
0-12-799959-0
0-12-800472-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910788199303321 |
Rosing Mark Von | ||
Waltham, Massachusetts : , : Morgan Kaufmann, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The complete business process handbook . Volume I : body of knowledge from process modeling to bpm / / Mark von Rosing, August-Wilhelm Scheer, Henrik von Scheel |
Autore | Rosing Mark Von |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Morgan Kaufmann, , 2015 |
Descrizione fisica | 1 online resource (813 pages) : illustrations |
Disciplina | 658.5 |
Soggetto topico |
Process control
Management information systems |
ISBN |
0-12-799959-0
0-12-800472-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910823046903321 |
Rosing Mark Von | ||
Waltham, Massachusetts : , : Morgan Kaufmann, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Compression algorithms for real programmers / Peter Wayner |
Autore | Wayner, Peter |
Pubbl/distr/stampa | San Francisco, : Morgan Kaufmann, 2000 |
Descrizione fisica | xii, 240 p. ; 23 cm. |
Disciplina | 005.74/6 |
Soggetto topico | Matematica - Elaborazione dei dati |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNICAS-RML0266357 |
Wayner, Peter | ||
San Francisco, : Morgan Kaufmann, 2000 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Cassino | ||
|
Computer and information security handbook / / edited by John R. Vacca |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | Amsterdam, Netherlands, : Elsevier, c2013 |
Descrizione fisica | 1 online resource (xxviii, 1171 pages) : illustrations (some color) |
Disciplina | 005.8 |
Collana | Gale eBooks |
Soggetto topico |
Computer networks - Security measures
Penetration testing (Computer security) |
ISBN |
1-78402-344-2
0-12-394612-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Computer and Information Security Handbook; Copyright Page; Dedication; Contents; Foreword; Preface; Organization of this Book; Part 1: Overview of System and Network Security: A Comprehensive Introduction; Part 2: Managing Information Security; Part 3: Cyber, Network, and Systems Forensics Security and Assurance; Part 4: Encryption Technology; Part 5: Privacy and Access Management; Part 6: Storage Security; Part 7: Physical Security; Part 8: Practical Security; Part 9: Advanced Security; Supplemental Materials; Acknowledgments; About the Editor; Contributors
I. Overview of System and Network Security: A Comprehensive Introduction1 Building a Secure Organization; 1. Obstacles to Security; Security Is Inconvenient; 2. Computers are Powerful and Complex; Computer Users Are Unsophisticated; Computers Created Without a Thought to Security; 3. Current Trend is to Share, Not Protect; Data Accessible from Anywhere; 4. Security isn't about Hardware and Software; The Bad Guys Are Very Sophisticated; Management Sees Security as a Drain on the Bottom Line; 5. Ten Steps to Building a Secure Organization; Evaluate the Risks and Threats Threats Based on the Infrastructure ModelThreats Based on the Business Itself; Threats Based on Industry; Global Threats; Beware of Common Misconceptions; Provide Security Training for IT Staff-Now and Forever; Think "Outside the Box"; DOXing; Train Employees: Develop a Culture of Security; Identify and Utilize Built-in Security Features of the Operating System and Applications; Monitor Systems; Hire a Third Party to Audit Security; Don't Forget the Basics; Change Default Account Passwords; Use Robust Passwords; Close Unnecessary Ports; Patch, Patch, Patch Use Administrator Accounts for Administrative TasksRestrict Physical Access; Don't Forget Paper!; 6. Preparing for the Building of Security Control Assessments; 7. Summary; Chapter Review Questions/Exercises; True/False; Multiple Choice; Exercise; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 2 A Cryptography Primer; 1 What is Cryptography? What is Encryption?; How Is Cryptography Done?; 2 Famous Cryptographic Devices; The Lorenz Cipher; Enigma; 3 Ciphers; The Substitution Cipher; The Shift Cipher; The Polyalphabetic Cipher The Kasiski/Kerckhoff Method4 Modern Cryptography; The Vernam Cipher (Stream Cipher); The One-Time Pad; Cracking Ciphers; The XOR Cipher and Logical Operands; Block Ciphers; 5 The Computer Age; Data Encryption Standard; Theory of Operation; Implementation; Rivest, Shamir, and Adleman (RSA); Advanced Encryption Standard (AES or Rijndael); Overview; The Basics of AES; 6 How AES Works; Bytes; Math; In the Beginning; Rounds; 7 Selecting Cryptography: the Process; 8 Summary; Chapter Review Questions/Exercises; True/False; Multiple Choice; Exercise; Problem; Hands-On Projects; Project Case Projects |
Record Nr. | UNINA-9910792480203321 |
Amsterdam, Netherlands, : Elsevier, c2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer and information security handbook / / edited by John R. Vacca |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | Amsterdam, Netherlands, : Elsevier, c2013 |
Descrizione fisica | 1 online resource (xxviii, 1171 pages) : illustrations (some color) |
Disciplina | 005.8 |
Collana | Gale eBooks |
Soggetto topico |
Computer networks - Security measures
Penetration testing (Computer security) |
ISBN |
1-78402-344-2
0-12-394612-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Computer and Information Security Handbook; Copyright Page; Dedication; Contents; Foreword; Preface; Organization of this Book; Part 1: Overview of System and Network Security: A Comprehensive Introduction; Part 2: Managing Information Security; Part 3: Cyber, Network, and Systems Forensics Security and Assurance; Part 4: Encryption Technology; Part 5: Privacy and Access Management; Part 6: Storage Security; Part 7: Physical Security; Part 8: Practical Security; Part 9: Advanced Security; Supplemental Materials; Acknowledgments; About the Editor; Contributors
I. Overview of System and Network Security: A Comprehensive Introduction1 Building a Secure Organization; 1. Obstacles to Security; Security Is Inconvenient; 2. Computers are Powerful and Complex; Computer Users Are Unsophisticated; Computers Created Without a Thought to Security; 3. Current Trend is to Share, Not Protect; Data Accessible from Anywhere; 4. Security isn't about Hardware and Software; The Bad Guys Are Very Sophisticated; Management Sees Security as a Drain on the Bottom Line; 5. Ten Steps to Building a Secure Organization; Evaluate the Risks and Threats Threats Based on the Infrastructure ModelThreats Based on the Business Itself; Threats Based on Industry; Global Threats; Beware of Common Misconceptions; Provide Security Training for IT Staff-Now and Forever; Think "Outside the Box"; DOXing; Train Employees: Develop a Culture of Security; Identify and Utilize Built-in Security Features of the Operating System and Applications; Monitor Systems; Hire a Third Party to Audit Security; Don't Forget the Basics; Change Default Account Passwords; Use Robust Passwords; Close Unnecessary Ports; Patch, Patch, Patch Use Administrator Accounts for Administrative TasksRestrict Physical Access; Don't Forget Paper!; 6. Preparing for the Building of Security Control Assessments; 7. Summary; Chapter Review Questions/Exercises; True/False; Multiple Choice; Exercise; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 2 A Cryptography Primer; 1 What is Cryptography? What is Encryption?; How Is Cryptography Done?; 2 Famous Cryptographic Devices; The Lorenz Cipher; Enigma; 3 Ciphers; The Substitution Cipher; The Shift Cipher; The Polyalphabetic Cipher The Kasiski/Kerckhoff Method4 Modern Cryptography; The Vernam Cipher (Stream Cipher); The One-Time Pad; Cracking Ciphers; The XOR Cipher and Logical Operands; Block Ciphers; 5 The Computer Age; Data Encryption Standard; Theory of Operation; Implementation; Rivest, Shamir, and Adleman (RSA); Advanced Encryption Standard (AES or Rijndael); Overview; The Basics of AES; 6 How AES Works; Bytes; Math; In the Beginning; Rounds; 7 Selecting Cryptography: the Process; 8 Summary; Chapter Review Questions/Exercises; True/False; Multiple Choice; Exercise; Problem; Hands-On Projects; Project Case Projects |
Record Nr. | UNINA-9910823189503321 |
Amsterdam, Netherlands, : Elsevier, c2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer and information security handbook [[electronic resource] /] / edited by John R. Vacca |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Morgan Kaufmann, c2009 |
Descrizione fisica | 1 online resource (877 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | VaccaJohn R |
Collana | Morgan Kaufmann series in computer security |
Soggetto topico |
Computer networks - Security measures
Computer security |
Soggetto genere / forma | Electronic books. |
ISBN |
1-282-16870-3
9786612168703 0-08-092194-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Computer and Information Security Handbook; Copyright Page; Contents; Foreword; Preface; Acknowledgments; About the Editor; Contributors; I. Overview of System and Network Security: A Comprehensive Introduction; 1. Building a Secure Organization; 1. Obstacles to security; Security Is Inconvenient; Computers Are Powerful and Complex; Computer Users Are Unsophisticated; Computers Created Without a Thought to Security; Current Trend Is to Share, Not Protect; Data Accessible from Anywhere; Security Isn't About Hardware and Software; The Bad Guys Are Very Sophisticated
Management Sees Security as a Drain on the Bottom Line2. Ten steps to building a secure organization; A. Evaluate the Risks and Threats; Threats Based on the Infrastructure Model; Threats Based on the Business Itself; Threats Based on Industry; Global Threats; B. Beware of Common Misconceptions; C. Provide Security Training for IT Staff-Now and Forever; D. Think "Outside the Box"; E. Train Employees: Develop a Culture of Security; F. Identify and Utilize Built-In Security Features of the Operating System and Applications; G. Monitor Systems; H. Hire a Third Party to Audit Security I. Don't Forget the BasicsChange Default Account Passwords; Use Robust Passwords; Close Unnecessary Ports; J. Patch, Patch, Patch; Use Administrator Accounts for Administrative Tasks; Restrict Physical Access; Don't Forget Paper!; 2. A Cryptography Primer; 1. What is cryptography? what is encryption?; How Is Cryptography Done?; 2. Famous cryptographic devices; The Lorenz Cipher; Enigma; 3. Ciphers; The Substitution Cipher; The Shift Cipher; The Polyalphabetic Cipher; The Kasiski/Kerckhoff Method; 4. Modern cryptography; The Vernam Cipher (Stream Cipher); The One-Time Pad; Cracking Ciphers The XOR Cipher and Logical OperandsBlock Ciphers; 5. The computer age; Data Encryption Standard; Theory of Operation; Implementation; Rivest, Shamir, and Adleman (RSA); Advanced Encryption Standard (AES or Rijndael); 3. Preventing System Intrusions; 1. So, what is an intrusion?; 2. Sobering numbers; 3. Know your enemy: hackers versus crackers; 4. Motives; 5. Tools of the trade; 6. Bots; 7. Symptoms of intrusions; 8. What can you do?; Know Today's Network Needs; Network Security Best Practices; 9. Security policies; 10. Risk analysis; Vulnerability Testing; Audits; Recovery 11. Tools of your tradeFirewalls; Intrusion Prevention Systems; Application Firewalls; Access Control Systems; Unified Threat Management; 12. Controlling user access; Authentication, Authorization, and Accounting; What the User Knows; What the User Has; Tokens; The User Is Authenticated, But Is She Authorized?; Accounting; Keeping Current; 13. Conclusion; 4. Guarding Against Network Intrusions; 1. Traditional reconnaissance and attacks; 2. Malicious software; Lures and "Pull" Attacks; 3. Defense in depth; 4. Preventive measures; Access Control; Vulnerability Testing and Patching Closing Ports |
Record Nr. | UNINA-9910454576603321 |
Amsterdam ; ; Boston, : Morgan Kaufmann, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer and information security handbook [[electronic resource] /] / edited by John R. Vacca |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Morgan Kaufmann, c2009 |
Descrizione fisica | 1 online resource (877 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | VaccaJohn R |
Collana | Morgan Kaufmann series in computer security |
Soggetto topico |
Computer networks - Security measures
Computer security |
ISBN |
1-282-16870-3
9786612168703 0-08-092194-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Computer and Information Security Handbook; Copyright Page; Contents; Foreword; Preface; Acknowledgments; About the Editor; Contributors; I. Overview of System and Network Security: A Comprehensive Introduction; 1. Building a Secure Organization; 1. Obstacles to security; Security Is Inconvenient; Computers Are Powerful and Complex; Computer Users Are Unsophisticated; Computers Created Without a Thought to Security; Current Trend Is to Share, Not Protect; Data Accessible from Anywhere; Security Isn't About Hardware and Software; The Bad Guys Are Very Sophisticated
Management Sees Security as a Drain on the Bottom Line2. Ten steps to building a secure organization; A. Evaluate the Risks and Threats; Threats Based on the Infrastructure Model; Threats Based on the Business Itself; Threats Based on Industry; Global Threats; B. Beware of Common Misconceptions; C. Provide Security Training for IT Staff-Now and Forever; D. Think "Outside the Box"; E. Train Employees: Develop a Culture of Security; F. Identify and Utilize Built-In Security Features of the Operating System and Applications; G. Monitor Systems; H. Hire a Third Party to Audit Security I. Don't Forget the BasicsChange Default Account Passwords; Use Robust Passwords; Close Unnecessary Ports; J. Patch, Patch, Patch; Use Administrator Accounts for Administrative Tasks; Restrict Physical Access; Don't Forget Paper!; 2. A Cryptography Primer; 1. What is cryptography? what is encryption?; How Is Cryptography Done?; 2. Famous cryptographic devices; The Lorenz Cipher; Enigma; 3. Ciphers; The Substitution Cipher; The Shift Cipher; The Polyalphabetic Cipher; The Kasiski/Kerckhoff Method; 4. Modern cryptography; The Vernam Cipher (Stream Cipher); The One-Time Pad; Cracking Ciphers The XOR Cipher and Logical OperandsBlock Ciphers; 5. The computer age; Data Encryption Standard; Theory of Operation; Implementation; Rivest, Shamir, and Adleman (RSA); Advanced Encryption Standard (AES or Rijndael); 3. Preventing System Intrusions; 1. So, what is an intrusion?; 2. Sobering numbers; 3. Know your enemy: hackers versus crackers; 4. Motives; 5. Tools of the trade; 6. Bots; 7. Symptoms of intrusions; 8. What can you do?; Know Today's Network Needs; Network Security Best Practices; 9. Security policies; 10. Risk analysis; Vulnerability Testing; Audits; Recovery 11. Tools of your tradeFirewalls; Intrusion Prevention Systems; Application Firewalls; Access Control Systems; Unified Threat Management; 12. Controlling user access; Authentication, Authorization, and Accounting; What the User Knows; What the User Has; Tokens; The User Is Authenticated, But Is She Authorized?; Accounting; Keeping Current; 13. Conclusion; 4. Guarding Against Network Intrusions; 1. Traditional reconnaissance and attacks; 2. Malicious software; Lures and "Pull" Attacks; 3. Defense in depth; 4. Preventive measures; Access Control; Vulnerability Testing and Patching Closing Ports |
Record Nr. | UNINA-9910777956803321 |
Amsterdam ; ; Boston, : Morgan Kaufmann, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer and information security handbook [[electronic resource] /] / edited by John R. Vacca |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Morgan Kaufmann, c2009 |
Descrizione fisica | 1 online resource (877 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | VaccaJohn R |
Collana | Morgan Kaufmann series in computer security |
Soggetto topico |
Computer networks - Security measures
Computer security |
ISBN |
1-282-16870-3
9786612168703 0-08-092194-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Computer and Information Security Handbook; Copyright Page; Contents; Foreword; Preface; Acknowledgments; About the Editor; Contributors; I. Overview of System and Network Security: A Comprehensive Introduction; 1. Building a Secure Organization; 1. Obstacles to security; Security Is Inconvenient; Computers Are Powerful and Complex; Computer Users Are Unsophisticated; Computers Created Without a Thought to Security; Current Trend Is to Share, Not Protect; Data Accessible from Anywhere; Security Isn't About Hardware and Software; The Bad Guys Are Very Sophisticated
Management Sees Security as a Drain on the Bottom Line2. Ten steps to building a secure organization; A. Evaluate the Risks and Threats; Threats Based on the Infrastructure Model; Threats Based on the Business Itself; Threats Based on Industry; Global Threats; B. Beware of Common Misconceptions; C. Provide Security Training for IT Staff-Now and Forever; D. Think "Outside the Box"; E. Train Employees: Develop a Culture of Security; F. Identify and Utilize Built-In Security Features of the Operating System and Applications; G. Monitor Systems; H. Hire a Third Party to Audit Security I. Don't Forget the BasicsChange Default Account Passwords; Use Robust Passwords; Close Unnecessary Ports; J. Patch, Patch, Patch; Use Administrator Accounts for Administrative Tasks; Restrict Physical Access; Don't Forget Paper!; 2. A Cryptography Primer; 1. What is cryptography? what is encryption?; How Is Cryptography Done?; 2. Famous cryptographic devices; The Lorenz Cipher; Enigma; 3. Ciphers; The Substitution Cipher; The Shift Cipher; The Polyalphabetic Cipher; The Kasiski/Kerckhoff Method; 4. Modern cryptography; The Vernam Cipher (Stream Cipher); The One-Time Pad; Cracking Ciphers The XOR Cipher and Logical OperandsBlock Ciphers; 5. The computer age; Data Encryption Standard; Theory of Operation; Implementation; Rivest, Shamir, and Adleman (RSA); Advanced Encryption Standard (AES or Rijndael); 3. Preventing System Intrusions; 1. So, what is an intrusion?; 2. Sobering numbers; 3. Know your enemy: hackers versus crackers; 4. Motives; 5. Tools of the trade; 6. Bots; 7. Symptoms of intrusions; 8. What can you do?; Know Today's Network Needs; Network Security Best Practices; 9. Security policies; 10. Risk analysis; Vulnerability Testing; Audits; Recovery 11. Tools of your tradeFirewalls; Intrusion Prevention Systems; Application Firewalls; Access Control Systems; Unified Threat Management; 12. Controlling user access; Authentication, Authorization, and Accounting; What the User Knows; What the User Has; Tokens; The User Is Authenticated, But Is She Authorized?; Accounting; Keeping Current; 13. Conclusion; 4. Guarding Against Network Intrusions; 1. Traditional reconnaissance and attacks; 2. Malicious software; Lures and "Pull" Attacks; 3. Defense in depth; 4. Preventive measures; Access Control; Vulnerability Testing and Patching Closing Ports |
Record Nr. | UNINA-9910822693503321 |
Amsterdam ; ; Boston, : Morgan Kaufmann, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer animation [[electronic resource] ] : algorithms and techniques / / Rick Parent |
Autore | Parent Rick |
Edizione | [3rd ed.] |
Pubbl/distr/stampa | Waltham, Mass., : Morgan Kaufmann, 2012 |
Descrizione fisica | 1 online resource (541 p.) |
Disciplina | 006.696 |
Collana | The Morgan Kaufmann Series in Computer Graphics |
Soggetto topico | Computer animation |
Soggetto genere / forma | Electronic books. |
ISBN | 0-12-415973-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Computer Animation: Algorithms and Techniques; Copyright; Dedication; Contents; Preface; Overview; Organization of the Book; Acknowledgments; References; About the Author; Chapter 1: Introduction; 1.1. Motion perception; 1.2. The heritage of animation; 1.2.1. Early devices; 1.2.2. The early days of ``conventional ́ ́ animation; 1.2.3. Disney; 1.2.4. Contributions of others; 1.2.5. Other media for animation; 1.3. Animation production; 1.3.1. Principles of animation; Simulating physics; Designing aesthetically pleasing actions; Effectively presenting action; Production technique
1.3.2. Principles of filmmaking Three-point lighting; 180 rule; Rule of thirds; Types of shots; Tilt; Framing; Focus the viewer's attention; 1.3.3. Sound; 1.4. Computer animation production; 1.4.1. Computer animation production tasks; 1.4.2. Digital editing; In the old days; Digital on-line nonlinear editing; 1.4.3. Digital video; 1.4.4. Digital audio; Digital musical device control; Digital audio sampling; 1.5. A brief history of computer animation; 1.5.1. Early activity (pre-1980); 1.5.2. The middle years (the 1980's); 1.5.3. Animation comes of age (the mid-1980's and beyond); 1.6. Summary References Chapter 2: Technical Background; 2.1. Spaces and transformations; 2.1.1. The display pipeline; 2.1.2. Homogeneous coordinates and the transformation matrix; 2.1.3. Concatenating transformations: multiplying transformation matrices; 2.1.4. Basic transformations; 2.1.5. Representing an arbitrary orientation; Fixed-angle representation; 2.1.6. Extracting transformations from a matrix; 2.1.7. Description of transformations in the display pipeline; Object space to world space transformation; World space to eye space transformation; Perspective matrix multiply; Perspective divide Image to screen space mapping 2.1.8. Error considerations; Accumulated round-off error; Orthonormalization; Considerations of scale; 2.2. Orientation representation; 2.2.1. Fixed-angle representation; 2.2.2. Euler angle representation; 2.2.3. Angle and axis representation; 2.2.4. Quaternion representation; Basic quaternion math; Representing rotations using quaternions; Rotating vectors using quaternions; 2.2.5. Exponential map representation; 2.3. Summary; References; Chapter 3: Interpolating Values; 3.1. Interpolation; 3.1.1. The appropriate function; Interpolation versus approximation Complexity Continuity; Global versus local control; 3.1.2. Summary; 3.2. Controlling the motion of a point along a curve; 3.2.1. Computing arc length; The analytic approach to computing arc length; Estimating arc length by forward differencing; Adaptive approach; Estimating the arc length integral numerically; Adaptive Gaussian integration; Find a point that is a given distance along a curve; 3.2.2. Speed control; 3.2.3. Ease-in/ease-out; Sine interpolation; Using sinusoidal pieces for acceleration and deceleration; Single cubic polynomial ease-in/ease-out... Constant acceleration: parabolic ease-in/ease-out |
Record Nr. | UNINA-9910462004903321 |
Parent Rick | ||
Waltham, Mass., : Morgan Kaufmann, 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|