top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
The complete business process handbook . Volume I : body of knowledge from process modeling to bpm / / Mark von Rosing, August-Wilhelm Scheer, Henrik von Scheel
The complete business process handbook . Volume I : body of knowledge from process modeling to bpm / / Mark von Rosing, August-Wilhelm Scheer, Henrik von Scheel
Autore Rosing Mark Von
Edizione [1st edition]
Pubbl/distr/stampa Waltham, Massachusetts : , : Morgan Kaufmann, , 2015
Descrizione fisica 1 online resource (813 pages) : illustrations
Disciplina 658.5
Soggetto topico Process control
Management information systems
Soggetto genere / forma Electronic books.
ISBN 0-12-799959-0
0-12-800472-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910463807403321
Rosing Mark Von  
Waltham, Massachusetts : , : Morgan Kaufmann, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The complete business process handbook . Volume I : body of knowledge from process modeling to bpm / / Mark von Rosing, August-Wilhelm Scheer, Henrik von Scheel
The complete business process handbook . Volume I : body of knowledge from process modeling to bpm / / Mark von Rosing, August-Wilhelm Scheer, Henrik von Scheel
Autore Rosing Mark Von
Edizione [1st edition]
Pubbl/distr/stampa Waltham, Massachusetts : , : Morgan Kaufmann, , 2015
Descrizione fisica 1 online resource (813 pages) : illustrations
Disciplina 658.5
Soggetto topico Process control
Management information systems
ISBN 0-12-799959-0
0-12-800472-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910788199303321
Rosing Mark Von  
Waltham, Massachusetts : , : Morgan Kaufmann, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The complete business process handbook . Volume I : body of knowledge from process modeling to bpm / / Mark von Rosing, August-Wilhelm Scheer, Henrik von Scheel
The complete business process handbook . Volume I : body of knowledge from process modeling to bpm / / Mark von Rosing, August-Wilhelm Scheer, Henrik von Scheel
Autore Rosing Mark Von
Edizione [1st edition]
Pubbl/distr/stampa Waltham, Massachusetts : , : Morgan Kaufmann, , 2015
Descrizione fisica 1 online resource (813 pages) : illustrations
Disciplina 658.5
Soggetto topico Process control
Management information systems
ISBN 0-12-799959-0
0-12-800472-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910823046903321
Rosing Mark Von  
Waltham, Massachusetts : , : Morgan Kaufmann, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Compression algorithms for real programmers / Peter Wayner
Compression algorithms for real programmers / Peter Wayner
Autore Wayner, Peter
Pubbl/distr/stampa San Francisco, : Morgan Kaufmann, 2000
Descrizione fisica xii, 240 p. ; 23 cm.
Disciplina 005.74/6
Soggetto topico Matematica - Elaborazione dei dati
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNICAS-RML0266357
Wayner, Peter  
San Francisco, : Morgan Kaufmann, 2000
Materiale a stampa
Lo trovi qui: Univ. di Cassino
Opac: Controlla la disponibilità qui
Computer and information security handbook / / edited by John R. Vacca
Computer and information security handbook / / edited by John R. Vacca
Edizione [2nd ed.]
Pubbl/distr/stampa Amsterdam, Netherlands, : Elsevier, c2013
Descrizione fisica 1 online resource (xxviii, 1171 pages) : illustrations (some color)
Disciplina 005.8
Collana Gale eBooks
Soggetto topico Computer networks - Security measures
Penetration testing (Computer security)
ISBN 1-78402-344-2
0-12-394612-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Computer and Information Security Handbook; Copyright Page; Dedication; Contents; Foreword; Preface; Organization of this Book; Part 1: Overview of System and Network Security: A Comprehensive Introduction; Part 2: Managing Information Security; Part 3: Cyber, Network, and Systems Forensics Security and Assurance; Part 4: Encryption Technology; Part 5: Privacy and Access Management; Part 6: Storage Security; Part 7: Physical Security; Part 8: Practical Security; Part 9: Advanced Security; Supplemental Materials; Acknowledgments; About the Editor; Contributors
I. Overview of System and Network Security: A Comprehensive Introduction1 Building a Secure Organization; 1. Obstacles to Security; Security Is Inconvenient; 2. Computers are Powerful and Complex; Computer Users Are Unsophisticated; Computers Created Without a Thought to Security; 3. Current Trend is to Share, Not Protect; Data Accessible from Anywhere; 4. Security isn't about Hardware and Software; The Bad Guys Are Very Sophisticated; Management Sees Security as a Drain on the Bottom Line; 5. Ten Steps to Building a Secure Organization; Evaluate the Risks and Threats
Threats Based on the Infrastructure ModelThreats Based on the Business Itself; Threats Based on Industry; Global Threats; Beware of Common Misconceptions; Provide Security Training for IT Staff-Now and Forever; Think "Outside the Box"; DOXing; Train Employees: Develop a Culture of Security; Identify and Utilize Built-in Security Features of the Operating System and Applications; Monitor Systems; Hire a Third Party to Audit Security; Don't Forget the Basics; Change Default Account Passwords; Use Robust Passwords; Close Unnecessary Ports; Patch, Patch, Patch
Use Administrator Accounts for Administrative TasksRestrict Physical Access; Don't Forget Paper!; 6. Preparing for the Building of Security Control Assessments; 7. Summary; Chapter Review Questions/Exercises; True/False; Multiple Choice; Exercise; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 2 A Cryptography Primer; 1 What is Cryptography? What is Encryption?; How Is Cryptography Done?; 2 Famous Cryptographic Devices; The Lorenz Cipher; Enigma; 3 Ciphers; The Substitution Cipher; The Shift Cipher; The Polyalphabetic Cipher
The Kasiski/Kerckhoff Method4 Modern Cryptography; The Vernam Cipher (Stream Cipher); The One-Time Pad; Cracking Ciphers; The XOR Cipher and Logical Operands; Block Ciphers; 5 The Computer Age; Data Encryption Standard; Theory of Operation; Implementation; Rivest, Shamir, and Adleman (RSA); Advanced Encryption Standard (AES or Rijndael); Overview; The Basics of AES; 6 How AES Works; Bytes; Math; In the Beginning; Rounds; 7 Selecting Cryptography: the Process; 8 Summary; Chapter Review Questions/Exercises; True/False; Multiple Choice; Exercise; Problem; Hands-On Projects; Project
Case Projects
Record Nr. UNINA-9910792480203321
Amsterdam, Netherlands, : Elsevier, c2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer and information security handbook / / edited by John R. Vacca
Computer and information security handbook / / edited by John R. Vacca
Edizione [2nd ed.]
Pubbl/distr/stampa Amsterdam, Netherlands, : Elsevier, c2013
Descrizione fisica 1 online resource (xxviii, 1171 pages) : illustrations (some color)
Disciplina 005.8
Collana Gale eBooks
Soggetto topico Computer networks - Security measures
Penetration testing (Computer security)
ISBN 1-78402-344-2
0-12-394612-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Computer and Information Security Handbook; Copyright Page; Dedication; Contents; Foreword; Preface; Organization of this Book; Part 1: Overview of System and Network Security: A Comprehensive Introduction; Part 2: Managing Information Security; Part 3: Cyber, Network, and Systems Forensics Security and Assurance; Part 4: Encryption Technology; Part 5: Privacy and Access Management; Part 6: Storage Security; Part 7: Physical Security; Part 8: Practical Security; Part 9: Advanced Security; Supplemental Materials; Acknowledgments; About the Editor; Contributors
I. Overview of System and Network Security: A Comprehensive Introduction1 Building a Secure Organization; 1. Obstacles to Security; Security Is Inconvenient; 2. Computers are Powerful and Complex; Computer Users Are Unsophisticated; Computers Created Without a Thought to Security; 3. Current Trend is to Share, Not Protect; Data Accessible from Anywhere; 4. Security isn't about Hardware and Software; The Bad Guys Are Very Sophisticated; Management Sees Security as a Drain on the Bottom Line; 5. Ten Steps to Building a Secure Organization; Evaluate the Risks and Threats
Threats Based on the Infrastructure ModelThreats Based on the Business Itself; Threats Based on Industry; Global Threats; Beware of Common Misconceptions; Provide Security Training for IT Staff-Now and Forever; Think "Outside the Box"; DOXing; Train Employees: Develop a Culture of Security; Identify and Utilize Built-in Security Features of the Operating System and Applications; Monitor Systems; Hire a Third Party to Audit Security; Don't Forget the Basics; Change Default Account Passwords; Use Robust Passwords; Close Unnecessary Ports; Patch, Patch, Patch
Use Administrator Accounts for Administrative TasksRestrict Physical Access; Don't Forget Paper!; 6. Preparing for the Building of Security Control Assessments; 7. Summary; Chapter Review Questions/Exercises; True/False; Multiple Choice; Exercise; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 2 A Cryptography Primer; 1 What is Cryptography? What is Encryption?; How Is Cryptography Done?; 2 Famous Cryptographic Devices; The Lorenz Cipher; Enigma; 3 Ciphers; The Substitution Cipher; The Shift Cipher; The Polyalphabetic Cipher
The Kasiski/Kerckhoff Method4 Modern Cryptography; The Vernam Cipher (Stream Cipher); The One-Time Pad; Cracking Ciphers; The XOR Cipher and Logical Operands; Block Ciphers; 5 The Computer Age; Data Encryption Standard; Theory of Operation; Implementation; Rivest, Shamir, and Adleman (RSA); Advanced Encryption Standard (AES or Rijndael); Overview; The Basics of AES; 6 How AES Works; Bytes; Math; In the Beginning; Rounds; 7 Selecting Cryptography: the Process; 8 Summary; Chapter Review Questions/Exercises; True/False; Multiple Choice; Exercise; Problem; Hands-On Projects; Project
Case Projects
Record Nr. UNINA-9910823189503321
Amsterdam, Netherlands, : Elsevier, c2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer and information security handbook [[electronic resource] /] / edited by John R. Vacca
Computer and information security handbook [[electronic resource] /] / edited by John R. Vacca
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Morgan Kaufmann, c2009
Descrizione fisica 1 online resource (877 p.)
Disciplina 005.8
Altri autori (Persone) VaccaJohn R
Collana Morgan Kaufmann series in computer security
Soggetto topico Computer networks - Security measures
Computer security
Soggetto genere / forma Electronic books.
ISBN 1-282-16870-3
9786612168703
0-08-092194-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Computer and Information Security Handbook; Copyright Page; Contents; Foreword; Preface; Acknowledgments; About the Editor; Contributors; I. Overview of System and Network Security: A Comprehensive Introduction; 1. Building a Secure Organization; 1. Obstacles to security; Security Is Inconvenient; Computers Are Powerful and Complex; Computer Users Are Unsophisticated; Computers Created Without a Thought to Security; Current Trend Is to Share, Not Protect; Data Accessible from Anywhere; Security Isn't About Hardware and Software; The Bad Guys Are Very Sophisticated
Management Sees Security as a Drain on the Bottom Line2. Ten steps to building a secure organization; A. Evaluate the Risks and Threats; Threats Based on the Infrastructure Model; Threats Based on the Business Itself; Threats Based on Industry; Global Threats; B. Beware of Common Misconceptions; C. Provide Security Training for IT Staff-Now and Forever; D. Think "Outside the Box"; E. Train Employees: Develop a Culture of Security; F. Identify and Utilize Built-In Security Features of the Operating System and Applications; G. Monitor Systems; H. Hire a Third Party to Audit Security
I. Don't Forget the BasicsChange Default Account Passwords; Use Robust Passwords; Close Unnecessary Ports; J. Patch, Patch, Patch; Use Administrator Accounts for Administrative Tasks; Restrict Physical Access; Don't Forget Paper!; 2. A Cryptography Primer; 1. What is cryptography? what is encryption?; How Is Cryptography Done?; 2. Famous cryptographic devices; The Lorenz Cipher; Enigma; 3. Ciphers; The Substitution Cipher; The Shift Cipher; The Polyalphabetic Cipher; The Kasiski/Kerckhoff Method; 4. Modern cryptography; The Vernam Cipher (Stream Cipher); The One-Time Pad; Cracking Ciphers
The XOR Cipher and Logical OperandsBlock Ciphers; 5. The computer age; Data Encryption Standard; Theory of Operation; Implementation; Rivest, Shamir, and Adleman (RSA); Advanced Encryption Standard (AES or Rijndael); 3. Preventing System Intrusions; 1. So, what is an intrusion?; 2. Sobering numbers; 3. Know your enemy: hackers versus crackers; 4. Motives; 5. Tools of the trade; 6. Bots; 7. Symptoms of intrusions; 8. What can you do?; Know Today's Network Needs; Network Security Best Practices; 9. Security policies; 10. Risk analysis; Vulnerability Testing; Audits; Recovery
11. Tools of your tradeFirewalls; Intrusion Prevention Systems; Application Firewalls; Access Control Systems; Unified Threat Management; 12. Controlling user access; Authentication, Authorization, and Accounting; What the User Knows; What the User Has; Tokens; The User Is Authenticated, But Is She Authorized?; Accounting; Keeping Current; 13. Conclusion; 4. Guarding Against Network Intrusions; 1. Traditional reconnaissance and attacks; 2. Malicious software; Lures and "Pull" Attacks; 3. Defense in depth; 4. Preventive measures; Access Control; Vulnerability Testing and Patching
Closing Ports
Record Nr. UNINA-9910454576603321
Amsterdam ; ; Boston, : Morgan Kaufmann, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer and information security handbook [[electronic resource] /] / edited by John R. Vacca
Computer and information security handbook [[electronic resource] /] / edited by John R. Vacca
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Morgan Kaufmann, c2009
Descrizione fisica 1 online resource (877 p.)
Disciplina 005.8
Altri autori (Persone) VaccaJohn R
Collana Morgan Kaufmann series in computer security
Soggetto topico Computer networks - Security measures
Computer security
ISBN 1-282-16870-3
9786612168703
0-08-092194-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Computer and Information Security Handbook; Copyright Page; Contents; Foreword; Preface; Acknowledgments; About the Editor; Contributors; I. Overview of System and Network Security: A Comprehensive Introduction; 1. Building a Secure Organization; 1. Obstacles to security; Security Is Inconvenient; Computers Are Powerful and Complex; Computer Users Are Unsophisticated; Computers Created Without a Thought to Security; Current Trend Is to Share, Not Protect; Data Accessible from Anywhere; Security Isn't About Hardware and Software; The Bad Guys Are Very Sophisticated
Management Sees Security as a Drain on the Bottom Line2. Ten steps to building a secure organization; A. Evaluate the Risks and Threats; Threats Based on the Infrastructure Model; Threats Based on the Business Itself; Threats Based on Industry; Global Threats; B. Beware of Common Misconceptions; C. Provide Security Training for IT Staff-Now and Forever; D. Think "Outside the Box"; E. Train Employees: Develop a Culture of Security; F. Identify and Utilize Built-In Security Features of the Operating System and Applications; G. Monitor Systems; H. Hire a Third Party to Audit Security
I. Don't Forget the BasicsChange Default Account Passwords; Use Robust Passwords; Close Unnecessary Ports; J. Patch, Patch, Patch; Use Administrator Accounts for Administrative Tasks; Restrict Physical Access; Don't Forget Paper!; 2. A Cryptography Primer; 1. What is cryptography? what is encryption?; How Is Cryptography Done?; 2. Famous cryptographic devices; The Lorenz Cipher; Enigma; 3. Ciphers; The Substitution Cipher; The Shift Cipher; The Polyalphabetic Cipher; The Kasiski/Kerckhoff Method; 4. Modern cryptography; The Vernam Cipher (Stream Cipher); The One-Time Pad; Cracking Ciphers
The XOR Cipher and Logical OperandsBlock Ciphers; 5. The computer age; Data Encryption Standard; Theory of Operation; Implementation; Rivest, Shamir, and Adleman (RSA); Advanced Encryption Standard (AES or Rijndael); 3. Preventing System Intrusions; 1. So, what is an intrusion?; 2. Sobering numbers; 3. Know your enemy: hackers versus crackers; 4. Motives; 5. Tools of the trade; 6. Bots; 7. Symptoms of intrusions; 8. What can you do?; Know Today's Network Needs; Network Security Best Practices; 9. Security policies; 10. Risk analysis; Vulnerability Testing; Audits; Recovery
11. Tools of your tradeFirewalls; Intrusion Prevention Systems; Application Firewalls; Access Control Systems; Unified Threat Management; 12. Controlling user access; Authentication, Authorization, and Accounting; What the User Knows; What the User Has; Tokens; The User Is Authenticated, But Is She Authorized?; Accounting; Keeping Current; 13. Conclusion; 4. Guarding Against Network Intrusions; 1. Traditional reconnaissance and attacks; 2. Malicious software; Lures and "Pull" Attacks; 3. Defense in depth; 4. Preventive measures; Access Control; Vulnerability Testing and Patching
Closing Ports
Record Nr. UNINA-9910777956803321
Amsterdam ; ; Boston, : Morgan Kaufmann, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer and information security handbook [[electronic resource] /] / edited by John R. Vacca
Computer and information security handbook [[electronic resource] /] / edited by John R. Vacca
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Morgan Kaufmann, c2009
Descrizione fisica 1 online resource (877 p.)
Disciplina 005.8
Altri autori (Persone) VaccaJohn R
Collana Morgan Kaufmann series in computer security
Soggetto topico Computer networks - Security measures
Computer security
ISBN 1-282-16870-3
9786612168703
0-08-092194-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Computer and Information Security Handbook; Copyright Page; Contents; Foreword; Preface; Acknowledgments; About the Editor; Contributors; I. Overview of System and Network Security: A Comprehensive Introduction; 1. Building a Secure Organization; 1. Obstacles to security; Security Is Inconvenient; Computers Are Powerful and Complex; Computer Users Are Unsophisticated; Computers Created Without a Thought to Security; Current Trend Is to Share, Not Protect; Data Accessible from Anywhere; Security Isn't About Hardware and Software; The Bad Guys Are Very Sophisticated
Management Sees Security as a Drain on the Bottom Line2. Ten steps to building a secure organization; A. Evaluate the Risks and Threats; Threats Based on the Infrastructure Model; Threats Based on the Business Itself; Threats Based on Industry; Global Threats; B. Beware of Common Misconceptions; C. Provide Security Training for IT Staff-Now and Forever; D. Think "Outside the Box"; E. Train Employees: Develop a Culture of Security; F. Identify and Utilize Built-In Security Features of the Operating System and Applications; G. Monitor Systems; H. Hire a Third Party to Audit Security
I. Don't Forget the BasicsChange Default Account Passwords; Use Robust Passwords; Close Unnecessary Ports; J. Patch, Patch, Patch; Use Administrator Accounts for Administrative Tasks; Restrict Physical Access; Don't Forget Paper!; 2. A Cryptography Primer; 1. What is cryptography? what is encryption?; How Is Cryptography Done?; 2. Famous cryptographic devices; The Lorenz Cipher; Enigma; 3. Ciphers; The Substitution Cipher; The Shift Cipher; The Polyalphabetic Cipher; The Kasiski/Kerckhoff Method; 4. Modern cryptography; The Vernam Cipher (Stream Cipher); The One-Time Pad; Cracking Ciphers
The XOR Cipher and Logical OperandsBlock Ciphers; 5. The computer age; Data Encryption Standard; Theory of Operation; Implementation; Rivest, Shamir, and Adleman (RSA); Advanced Encryption Standard (AES or Rijndael); 3. Preventing System Intrusions; 1. So, what is an intrusion?; 2. Sobering numbers; 3. Know your enemy: hackers versus crackers; 4. Motives; 5. Tools of the trade; 6. Bots; 7. Symptoms of intrusions; 8. What can you do?; Know Today's Network Needs; Network Security Best Practices; 9. Security policies; 10. Risk analysis; Vulnerability Testing; Audits; Recovery
11. Tools of your tradeFirewalls; Intrusion Prevention Systems; Application Firewalls; Access Control Systems; Unified Threat Management; 12. Controlling user access; Authentication, Authorization, and Accounting; What the User Knows; What the User Has; Tokens; The User Is Authenticated, But Is She Authorized?; Accounting; Keeping Current; 13. Conclusion; 4. Guarding Against Network Intrusions; 1. Traditional reconnaissance and attacks; 2. Malicious software; Lures and "Pull" Attacks; 3. Defense in depth; 4. Preventive measures; Access Control; Vulnerability Testing and Patching
Closing Ports
Record Nr. UNINA-9910822693503321
Amsterdam ; ; Boston, : Morgan Kaufmann, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer animation [[electronic resource] ] : algorithms and techniques / / Rick Parent
Computer animation [[electronic resource] ] : algorithms and techniques / / Rick Parent
Autore Parent Rick
Edizione [3rd ed.]
Pubbl/distr/stampa Waltham, Mass., : Morgan Kaufmann, 2012
Descrizione fisica 1 online resource (541 p.)
Disciplina 006.696
Collana The Morgan Kaufmann Series in Computer Graphics
Soggetto topico Computer animation
Soggetto genere / forma Electronic books.
ISBN 0-12-415973-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Computer Animation: Algorithms and Techniques; Copyright; Dedication; Contents; Preface; Overview; Organization of the Book; Acknowledgments; References; About the Author; Chapter 1: Introduction; 1.1. Motion perception; 1.2. The heritage of animation; 1.2.1. Early devices; 1.2.2. The early days of ``conventional ́ ́ animation; 1.2.3. Disney; 1.2.4. Contributions of others; 1.2.5. Other media for animation; 1.3. Animation production; 1.3.1. Principles of animation; Simulating physics; Designing aesthetically pleasing actions; Effectively presenting action; Production technique
1.3.2. Principles of filmmaking Three-point lighting; 180 rule; Rule of thirds; Types of shots; Tilt; Framing; Focus the viewer's attention; 1.3.3. Sound; 1.4. Computer animation production; 1.4.1. Computer animation production tasks; 1.4.2. Digital editing; In the old days; Digital on-line nonlinear editing; 1.4.3. Digital video; 1.4.4. Digital audio; Digital musical device control; Digital audio sampling; 1.5. A brief history of computer animation; 1.5.1. Early activity (pre-1980); 1.5.2. The middle years (the 1980's); 1.5.3. Animation comes of age (the mid-1980's and beyond); 1.6. Summary
References Chapter 2: Technical Background; 2.1. Spaces and transformations; 2.1.1. The display pipeline; 2.1.2. Homogeneous coordinates and the transformation matrix; 2.1.3. Concatenating transformations: multiplying transformation matrices; 2.1.4. Basic transformations; 2.1.5. Representing an arbitrary orientation; Fixed-angle representation; 2.1.6. Extracting transformations from a matrix; 2.1.7. Description of transformations in the display pipeline; Object space to world space transformation; World space to eye space transformation; Perspective matrix multiply; Perspective divide
Image to screen space mapping 2.1.8. Error considerations; Accumulated round-off error; Orthonormalization; Considerations of scale; 2.2. Orientation representation; 2.2.1. Fixed-angle representation; 2.2.2. Euler angle representation; 2.2.3. Angle and axis representation; 2.2.4. Quaternion representation; Basic quaternion math; Representing rotations using quaternions; Rotating vectors using quaternions; 2.2.5. Exponential map representation; 2.3. Summary; References; Chapter 3: Interpolating Values; 3.1. Interpolation; 3.1.1. The appropriate function; Interpolation versus approximation
Complexity Continuity; Global versus local control; 3.1.2. Summary; 3.2. Controlling the motion of a point along a curve; 3.2.1. Computing arc length; The analytic approach to computing arc length; Estimating arc length by forward differencing; Adaptive approach; Estimating the arc length integral numerically; Adaptive Gaussian integration; Find a point that is a given distance along a curve; 3.2.2. Speed control; 3.2.3. Ease-in/ease-out; Sine interpolation; Using sinusoidal pieces for acceleration and deceleration; Single cubic polynomial ease-in/ease-out...
Constant acceleration: parabolic ease-in/ease-out
Record Nr. UNINA-9910462004903321
Parent Rick  
Waltham, Mass., : Morgan Kaufmann, 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui