TTC – Medical Myths, Lies and Half-Truths (2010)

TTC – Medical Myths, Lies and Half-Truths (2010)
English | Size: 5.07 GB
Category: Science: Biology

True or false: Eight glasses of water a day are mandatory for staying hydrated. Vitamin C protects you from catching a cold. Frequent snacking is the quickest way to bust your diet. Natural foods are always better for you. You hear advice like this all the time. But what do these four nuggets of so-called medical wisdom have in common? They’re all myths, half-truths, and misconceptions-pieces of information so familiar we take them for granted without truly considering the scientific truth behind them. [Read more…]

TRAFFIC – Low Poly Pretextured Vehicles

TRAFFIC – Low Poly Pretextured Vehicles
English | Size: 348 MB
Category: Tutorial

TRAFFIC – Low Poly Pretextured Vehicles contains 60 photorealistic, low polygon 3D vehicle models with textures already applied. The high-resolution textures give the low poly vehicle models the look of large, conventional 3D models with polygon counts upwards to ten times the polygon count and usually costing at least ten times the price. The TRAFFIC models enable scene efficiency, faster rendering times and ease of use. The models are great for architectural visualizations, movie FX, computer games and any 3D application requiring low poly count with high detail. Because of the TRAFFIC models’ hierearchical structures, they can also be animated, with wheels that turn and spin. In addition to presenting the TRAFFIC models individually, they are also presented in groups to fit various parking configurations. [Read more…]

Surviving Digital Forensics RAM Extraction Fundamentals (1)

Surviving Digital Forensics RAM Extraction Fundamentals (1)
English | Size: 205.03 MB
Category: CBTs

Conducting a RAM extraction as part of the computer evidence collection process is a front line examiner skill which becoming more and more in demand. A system’s live memory contains an assortment of valuable forensic data. A computer analyst trained in memory forensics can dig out evidence of hidden malware processes, user activity and encryption keys or password hashes that may be critical to accesses protected data.
[Read more…]

Softimage Production Series – Rendering in XSI

Softimage Production Series – Rendering in XSI
English | Size: 1.1 GB
Category: Tutorial

Understanding the render tree and render passes is vital to achieving quality renders in XSI. This DVD covers everything there is to know about them.

The first section introduces the render tree and teaches you how to extract position, rotation and UV information from your models. Render tree techniques are thoroughly discussed with topics such as creating a wipe mask, applying UV perturbation, using weight maps to control displacement maps, baking lighting information to color at vertices and altering rendering based on raytracing state. [Read more…]

Narbik CCIE Security Videos

Narbik CCIE Security Videos
English | Size: 3.85 GB
Category: Cisco | Security

The CCIE Security program is a program intended to recognize the Cisco network security experts who have the necessary skills to test, deploy, configure, maintain, and troubleshoot Cisco network security appliances and Cisco IOS Software devices that establish the security posture of the network. [Read more…]

Jason Capital – Social Switch

Jason Capital – Social Switch
English | Size: 44.13 MB
Category: Seduction: Audio

The training offers 10 "yes" compliance techniques, including:

– Social Dominance: How to make an audience bend to the will of your desires
– Silent Compliance: Making a girl happily comply without saying a word
– Ridiculous Compliance: Structuring a question in a way to make a girl see you as high-status
[Read more…]