Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Algorithms Sequential & Parallel: A Unified Approach (Electrical and Computer Engineering Series)
Algorithms Sequential & Parallel: A Unified Approach (Electrical and Computer Engineering Series)
A major thrust of computer science is the design, analysis, implementation, and scientific evaluation of algorithms to solve critical problems. In addition, new challenges are being offered to computer scientists in the field of computational science and engineering, which includes challenging problems in computational biology, computational fluid...
C++ Standard Library Practical Tips (Programming Series)
C++ Standard Library Practical Tips (Programming Series)
Put the Power of the C++ Standard Library to Work!

C++ Standard Library Practical Tips teaches beginning and experienced programmers how to use the Standard Library and its major component the Standard Template Library (STL) effectively in routine programming chores. The book provides 100 quick, easy-to-use tips and solutions to common...

Video Game Design Revealed (Revealed (Charles River Media))
Video Game Design Revealed (Revealed (Charles River Media))

Whether you are a professional game developer working in an established studio or a creative thinker interested in trying your hand at game design, "Video Game Design Revealed" will show you the steps and processes involved in bringing a video game from concept to completion. Beginning with an overview of the...

Developing Serious Games (Game Development Series)
Developing Serious Games (Game Development Series)
With the impressive growth the games industry has enjoyed for the past decade, game developers, educators, and marketing firms are excitedly envisioning serious games applications for computer game technologies. These applications- serious games- represent opportunities for game developers to apply their talents to areas outside of the...
The Software Vulnerability Guide (Programming Series)
The Software Vulnerability Guide (Programming Series)
In today’s market, secure software is a must for consumers. Many developers, however, are not familiar with the techniques needed to produce secure code or detect existing vulnerabilities. The Software Vulnerability Guide focuses on the origin of most software vulnerabilities, including the bugs in the underlying software used to develop IT...
Computer Forensics: Computer Crime Scene Investigation (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (Networking Series)
The Most Comprehensive, Up-to-Date, Reference on Computer Forensics! Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package...
Open Source for Windows Administrators (Administrator's Advantage Series)
Open Source for Windows Administrators (Administrator's Advantage Series)
The Most Comprehensive Reference on Open Source Apps for Windows Users!

This book introduces Microsoft® Windows® administrators to the world of Open Source applications in order to save time and money. It provides readers with information and techniques for using the appropriate Open Source applications in a variety of situations, such...

Learning Java Through Applications: A Graphical Approach (Programming Series)
Learning Java Through Applications: A Graphical Approach (Programming Series)
Learning Java Through Applications emphasizes Java’s graphical capabilities and the ability to create graphical user interfaces. The book uses 15 complete Java programs in order of increasing complexity, including geometric patterns, games, puzzles, number theory problems, and cryptography, to teach students the Java programming language and...
The VMWare Workstation 5 Handbook (Networking & Security)
The VMWare Workstation 5 Handbook (Networking & Security)
Bring the Power of Virtualization Software to Your Next Project!

VMware is the leading virtual machine software available today and it is the foundation for next generation computing as it allows users to run multiple operating systems simultaneously on the same PC. The VMware Workstation 5.0 Handbook teaches users the nuts and bolts of this...

Windows to Linux Business Desktop Migration
Windows to Linux Business Desktop Migration
Over the last four years, Linux has established itself as the fastest growing server platform for enterprise Information Technology. As the server platform grows the desktop platform is also growing, domestically and abroad. One of the areas most lacking information, however, is in the capability of Linux as a desktop replacement for a Microsoft...
Innovative Cryptography (Programming Series)
Innovative Cryptography (Programming Series)
Innovative Cryptography, Second Edition provides a cutting-edge evaluation and review of current findings in the area of cryptography and explores how to implement these new techniques efficiently. It covers current cryptographic problems and suggests practical solutions. The book also discusses the role of symmetric ciphers and symmetric block...
Data Structures and Algorithms for Game Developers (Game Development Series)
Data Structures and Algorithms for Game Developers (Game Development Series)
Data Structures and Algorithms for Game Developers teaches the fundamentals of the data structures and algorithms used in game development. It provides programmers with a detailed reference to what data structures and algorithms are, and why they are so critical in game development. It teaches new game programmers, students, and aspiring game...
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy