Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning HTML5 Game Programming: A Hands-on Guide to Building Online Games Using Canvas, SVG, and WebGL
Learning HTML5 Game Programming: A Hands-on Guide to Building Online Games Using Canvas, SVG, and WebGL

Get Started Fast with HTML5 Online Game Programming!

 

HTML5 will transform web and mobile gaming. As new browsers rapidly adopt it, HTML5 will do everything “legacy” technologies such as Flash and Silverlight have done—and...

SQL Server Query Performance Tuning
SQL Server Query Performance Tuning

Queries not running fast enough? Wondering about the in-memory database features in 2014? Tired of phone calls from frustrated users? Grant Fritchey’s book SQL Server Query Performance Tuning is the answer to your SQL Server query performance problems. The book is revised to cover the very latest in performance optimization...

Mastering Nginx
Mastering Nginx

Written for experienced systems administrators and engineers, this book teaches you from scratch how to configure Nginx for any situation. Step-by-step instructions and real-world code snippets clarify even the most complex areas.

Overview

  • An in-depth configuration guide to help you understand how to best...
The Definitive Guide to SQLite (Expert's Voice in Open Source)
The Definitive Guide to SQLite (Expert's Voice in Open Source)

The Definitive Guide to SQLite, Second Edition is your one-stop resource for integrating one of the most advanced and innovative open source database management systems into your development projects. SQLite is freely-available and comes with an amazingly small foot print of less than 300 kilobytes for a full-blown implementation....

Modern Compiler Implementation in C
Modern Compiler Implementation in C

This new, expanded textbook describes all phases of a modern compiler: lexical analysis, parsing, abstract syntax, semantic actions, intermediate representations, instruction selection via tree matching, dataflow analysis, graph-coloring register allocation, and runtime systems. It includes good coverage of current techniques in code...

Linux Kernel Development (3rd Edition)
Linux Kernel Development (3rd Edition)

Linux Kernel Development details the design and implementation of the Linux kernel, presenting the content in a manner that is beneficial to those writing and developing kernel code, as well as to programmers seeking to better understand the operating system and become more efficient and productive in their...

Hacking Exposed Wireless
Hacking Exposed Wireless

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute...

Network Attacks and Defenses: A Hands-on Approach
Network Attacks and Defenses: A Hands-on Approach

The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both...

Data Access Patterns: Database Interactions in Object-Oriented Applications
Data Access Patterns: Database Interactions in Object-Oriented Applications

Efficient, high-quality data access code is crucial to the performance and usability of virtually any enterprise application-and there's no better way to improve an existing system than to optimize its data access code. Regardless of database engine, platform, language, or application, developers repeatedly encounter the same...

The Fractal Structure of Data Reference: Applications to the Memory Hierarchy
The Fractal Structure of Data Reference: Applications to the Memory Hierarchy
For purposes of understanding its performance, a computer system is traditionally viewed as a processor coupled to one or more disk storage devices, and driven by externally generated requests (typically called transactions). Over the past several decades, very powerful techniques have become available to the performance analyst attempting to...
Joe Grand's Best of Hardware, Wireless, & Game Console Hacking: Includes DVD with 20 Hacks in High-Res Color
Joe Grand's Best of Hardware, Wireless, & Game Console Hacking: Includes DVD with 20 Hacks in High-Res Color
Before you start your hacking projects, you'll need the right arsenal of tools. For some hacks, you might need only a single screwdriver. For others, you could need a workshop complete with power tools and advanced electronic equipment. For the most part, it isn't necessary to have a world-class laboratory or top-of-the-line computer system to...
Mastering OpenLDAP: Configuring, Securing and Integrating Directory Services
Mastering OpenLDAP: Configuring, Securing and Integrating Directory Services
This book is the ideal introduction to using OpenLDAP for Application Developers and will also benefit System Administrators running OpenLDAP. It prepares the reader to build a directory using OpenLDAP, and then employ this directory in the context of the network, taking a practical approach that emphasizes how to get things done. On occasion, it...
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy