Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
3D Programming for Windows (Pro - Developer)

Buy
The Windows Presentation Foundation is a key component of .NET Framework 3.0, which is a part of Windows Vista and available for Windows XP. With the Windows Presentation Foundation, 3D images can be displayed regardless of the video-display hardware on the users machine. Focusing on developing user interface objects or simple animations, this book builds on a readers knowledge of Windows Presentation Foundation essentials to demonstrate how to effectively create 3D graphics for Windows. You get the fundamental information for using the Windows Presentation Foundation 3D application programming interface (API), as well as in-depth coverage of mesh geometries.

Key Book Benefits:

-Features in-depth coverage of mesh geometries--the key technology that enables 3D in the Windows Presentation Foundation

-Written by a premier Windows programmer, Charles Petzold

-Includes code examples in XAML and Visual C#

-Supplements the Windows Presentation Foundation essentials covered in Applications = Code + Markup: A Guide to the Microsoft Windows Presentation Foundation

About the Author

Charles Petzold wrote the classic Programming Windows, which is currently in its fifth edition and one of the best-known and widely used programming books of all time. He was honored in 1994 with the Windows Pioneer Award, presented by Microsoft founder Bill Gates and Windows Magazine. He has been programming with Windows since first obtaining a beta of the Windows 1.0 SDK in the spring of 1985, and he wrote the very first magazine article on Windows programming in 1986. Charles is a Microsoft MVP for Client Application Development and the author of several other books, including Code: The Hidden Language of Computer Hardware and Software.

(HTML tags aren't allowed.)

Social CRM For Dummies
Social CRM For Dummies

Discover great ways to engage your customers through the social web

Social CRM is an evolving tool to help you engage your customers, interact with them, and develop deeper relationships. This handy guide teaches you how to make the most of it, whether your business is a small shop or a large corporation. In a friendly,...

Planning for IPv6
Planning for IPv6
Many readers may be awaiting the third edition of IPv6 Essentials. The event on February 3, 2011, when the IANA (Internet Assigned Numbers Authority) finally announced the depletion of the global IPv4 address pool changed the world. People seemed to wake up and realize it was high time to start planning for IPv6. But where to start?
...
Linux Networking Clearly Explained
Linux Networking Clearly Explained

"Bryan Pfaffenberger details the configuration and use of GNOME (as well as Enlightenment and KDE) in greater detail than anyother Linux book out there" David Wall of Amazon.com on Linux Clearly Explained

Bryan Pfaffenberger and Michael Jang bring their focused, step-by-step approach which made Linux
...


The UX Five-Second Rules: Guidelines for User Experience Design's Simplest Testing Technique
The UX Five-Second Rules: Guidelines for User Experience Design's Simplest Testing Technique

The five-second test is one of the most convenient rapid UX testing methods available, although its value can be compromised by ignoring the restrictions of the method. The Five-Second Rules uses detailed examples from a collection of more than 300 tests to describe the strengths and weaknesses of this rapid testing method. Readers...

Cisco Router Firewall Security
Cisco Router Firewall Security

The Cisco IOS firewall offers you the feature-rich functionality that you've come to expect from best-of-breed firewalls: address translation, authentication, encryption, stateful filtering, failover, URL content filtering, ACLs, NBAR, and many others. Cisco Router Firewall Security teaches...

Contemporary Cryptology (Advanced Courses in Mathematics - CRM Barcelona)
Contemporary Cryptology (Advanced Courses in Mathematics - CRM Barcelona)
In February 2004, at the Universitat Polit`ecnica de Catalunya, we presented a 45-hour Advanced Course on Contemporary Cryptology, organised by the Centre de Recerca Matem`atica. This volume is an expanded and unified version of the material presented in the lectures and the background material that we distributed among the...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy