 |
|
|
 Writing Game Center Apps in iOS: Bringing Your Players Into the Game
Now that Apple has introduced the GameKit framework to its iOS SDK, you can integrate Game Center features directly into your iPhone and iPad apps. This concise cookbook shows you how it's done, with 18 targeted recipes for adding leaderboards, user authentication, achievements, multiplayer games, and many other features. ... |  |  Selected Areas in Cryptography: 9th Annual International Workshop, SAC 2002
SAC 2002 was the Ninth Annual Workshop on Selected Areas in Cryptography. Previous workshops have been held at Queen’s University in Kingston (1994, 1996, 1998, and 1999), Carleton University in Ottawa (1995 and 1997), University of Waterloo (2000), and the Fields Institute in Toronto (2001). The intent of the workshop is to provide a... |  |  Image and Video Processing in the Compressed Domain
With more and more images and videos being available in the compressed
format, researchers have started taking interest in the aspect of designing
algorithms for different image operations directly in their domains of representation.
This would not only avoid the inverse and forward transformation
steps and potentially make the... |
|
 Developer's Guide to Microsoft Prism 4
Building WPF and Silverlight applications can be challenging, especially for those new to
the technology. Building clean, maintainable, extensible, testable, loosely coupled ones—
with no idea where to start—is close to impossible. In late 2007, I was privileged to get a
call from Glenn Block at Microsoft asking if I was... |  |  Computer Organization, Design, and Architecture, Fourth Edition
This book covers the organization, design, and architecture of computers. Architecture
is the ‘‘art or science of building; a method or style of building,’’ according
to Webster’s. A computer architect develops the functional and performance specifications
for the various blocks of a computer system and... |  |  Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
This book has been developed by and for security professionals who are dedicated to working in an ethical and responsible manner to improve the overall security posture of individuals, corporations, and nations.
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS
Thwart malicious network intrusion... |
|
|
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 |