 |
|
 Android NDK Game Development Cookbook
For C++ developers, this is the book that can swiftly propel you into the potentially profitable world of Android games. The 70+ step-by-step recipes using Android NDK will give you the wide-ranging knowledge you need.
Overview
-
Tips and tricks for developing and debugging mobile games on your desktop
... |  |  Code-First Development with Entity Framework
Take your data access skills to the next level with Entity Framework
About This Book
-
Learn how to create, retrieve, update, and delete the data in a relational database using .NET
-
Choose from an array of examples in C# and VB.NET that showcase the key concepts of Entity Framework
... |  |  Getting Started with Backbone Marionette
Build largescale JavaScript applications with Backbone Marionette quickly and efficiently
About This Book
-
Create scalable and highly interactive web applications using one of the best frameworks for Backbone.js
-
Learn about controllers, views, modules, events, commands, and regions
... |
|
|
 C# 6.0 in a Nutshell: The Definitive Reference
When you have questions about C# 6.0 or the .NET CLR and its core Framework assemblies, this bestselling guide has the answers you need. C# has become a language of unusual flexibility and breadth since its premiere in 2000, but this continual growth means there’s still much more to learn.
Organized around concepts... |  |  Scala High Performance Programming
Key Features Get the first book to explore Scala performance techniques in depth! Real-world inspired use cases illustrate and support the techniques studied and the language features This book is written by Vincent Theron and Michael Diamant, software engineers with several years of experience in the high-frequency trading and programmatic... |  |  Identity and Data Security for Web Development: Best Practices
Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how... |
|
|
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |