|
|
|
|
Serious Games: Games That Educate, Train, and InformLearn how to take the skills and knowledge you use to make games for entertainment to make serious games: games for education, training, healing, and more. ?Serious Games: Games That Educate, Train, and Inform? teaches game developers how to tap into the rapidly expanding market of serious games. Explore the numerous possibilities that serious... | | Grid Computing For Developers (Programming Series)Learn the Future of Computing Today!
Many industry analysts believe that Grid computing will be the next big wave in technology. It is so promising that major technology companies such as IBN, Microsoft, Oracle, and Sun are allocating significant quantities of resources for Grid research and development. A Developer’s Guide to Grid... | | Unix/Linux Survival Guide (Administrator's Advantage Series)The Reference That Every Unix SysAdmin Needs!
All Unix/Linux systems, regardless of manufacturer, have inherent similarities for administrators. The Unix/Linux Survival Guide details these similarities and teaches SysAdmins how to tackle jobs on all systems. Mixing administrator knowledge and best practices, the book walks admins step-by-step... |
|
|
|
Object-Oriented Programming: From Problem Solving to JavaObject-Oriented Programming: From Problem Solving to Java provides a thorough, easy-to-follow reference to master object-oriented programming principles. Throughout the text, problem solving and programming techniques are presented in modeling diagrams, pseudo-code, and flowcharts. Users then learn how to put theory into practice... | | Web 2.0 Security - Defending AJAX, RIA, AND SOAService-Oriented Architecure (SOA), Rich Internet Applications (RIA), and Asynchronous Java and eXtended Markup Language (Ajax) comprise the backbone behind now-widespread Web 2.0 applications, such as MySpace, Google Maps, Flickr, and Live.com. Although these robust tools make next-generation Web applications possible, they also add new security... | | Introduction to Network Security (Networking Series)In today's online, connected world where computers outsell TVs and e-commerce sales surpass those of "brick-and-mortar" stores, secure network environments are a necessity. Weaknesses within networks have led to the rapid growth of identity theft and computer virus outbreaks, so the demand for skilled and aspiring system administrators... |
|
|
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 |