Home | Amazing | Today | Tags | Publishers | Years | Search 
OpenGL Game Programming w/CD (Prima Tech's Game Development)
OpenGL Game Programming w/CD (Prima Tech's Game Development)
OpenGL® Game Programming teaches you how to use OpenGL to create dynamic 3D environments and effects for use in game development. Beginning with the histories of OpenGL and Microsoft® DirectX®, programming essentials for Microsoft Windows®, and 3D theory, you'll quickly move on to lessons on the functionality of OpenGL. Most of the...
SAP GRC For Dummies (Computer/Tech)
SAP GRC For Dummies (Computer/Tech)
Governance, risk, and compliance—these three big letters can add up to one giant headache. But GRC doesn't have to be a boil on your corporate behind. SAP GRC For Dummies untangles the web of regulations that confronts your company and introduces you to software solutions the not only keep you in compliance, but also make your whole...
Programmer's Ultimate Security DeskRef
Programmer's Ultimate Security DeskRef
The Programmer's Ultimate Security DeskRef is the only complete desk reference covering multiple languages and their inherent security issues. It will serve as the programming encyclopedia for almost every major language in use. While there are many books starting to address the broad subject of security best practices within the software...
The Open Mobile Alliance: Delivering Service Enablers for Next-Generation Applications
The Open Mobile Alliance: Delivering Service Enablers for Next-Generation Applications

A practical overview of OMA specifications and how they enable mobile multimedia services & much more …!

The Open Mobile Alliance (OMA) is an industry forum, which develops open specifications to help in the creation of applications and services to be deployed over converged networks. The alliance is...

Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition
Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition
An identity management system is defined as the management of the identity life cycle of entities (subjects or objects) during which the identity is established, described, and destroyed. What this definition fails to cover is the social, personal, and financial impact of the identity life cycle.

Before I joined Oracle as director of GRC
...
Marketing to the Social Web: How Digital Customer Communities Build Your Business
Marketing to the Social Web: How Digital Customer Communities Build Your Business
Praise for Marketing to the Social Web

"Weber understands that the world is going digital and that competitive advantage will accrue to those who understand the transformation. CEOs should heed this transformation and learn from Weber's insights how to navigate this new landscape to fully maximize their business opportunities."
...

Physical Security for IT
Physical Security for IT
"Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each...
Network Security Essentials (2nd Edition)
Network Security Essentials (2nd Edition)
This book provides a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards. This books covers e-mail security, IP security, Web security, and network management security. It also includes a concise section on the discipline of cryptography—covering algorithms and protocols...
Digital Communications: Fundamentals and Applications (2nd Edition)
Digital Communications: Fundamentals and Applications (2nd Edition)

Master every key digital communications technology, concept, and technique.

Digital Communications, Second Edition is a thoroughly revised and updated edition of the field's classic, best-selling introduction. With remarkable clarity, Dr. Bernard Sklar introduces every digital communication technology at the heart of today's wireless...

Designing Successful e-Learning, Michael Allen's Online Learning Library
Designing Successful e-Learning, Michael Allen's Online Learning Library
“The theoretical literature on learning and growth can be difficult to master and even more challenging to integrate into e-learning, but Michael has made this easy for all of us. He explains this thinking in clear and accessible language, amplifies the theories with research results, and describes popular approaches by applying these...
Beta Testing for Better Software
Beta Testing for Better Software
Implement, operate, and use beta testing immediately with this hands-on guide to the best practices

Beta testing is a complex process that, when properly run, provides a wealth of diverse information. But when poorly executed, it delivers little or no data while wasting time and money. Written by a leading expert in the field, this book will...

DW 2.0: The Architecture for the Next Generation of Data Warehousing (Morgan Kaufman Series in Data Management Systems)
DW 2.0: The Architecture for the Next Generation of Data Warehousing (Morgan Kaufman Series in Data Management Systems)
First book on the new generation of data warehouse architecture, DW 2.0--by the "father of the data warehouse".

Data Warehousing has been around for 20 years and has become part of the information technology infrastructure. Data warehousing originally grew in response to the corporate need for information--not
...
Result Page: 48 47 46 45 44 43 42 41 40 39 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy