Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Core Techniques and Algorithms in Game Programming
Core Techniques and Algorithms in Game Programming

To even try to keep pace with the rapid evolution of game development, you need a strong foundation in core programming techniques-not a hefty volume on one narrow topic or one that devotes itself to API-specific implementations. Finally, there's a guide that delivers! As a professor at the Spanish university that offered...

MCSE: Windows Server 2003 Network Security Design Study Guide (Exam 70-298)
MCSE: Windows Server 2003 Network Security Design Study Guide (Exam 70-298)

Microsoft’s Microsoft Certified Systems Administrator (MCSA) and Microsoft Certified Systems Engineer (MCSE) tracks for Windows Server 2003 are the premier certifications for computer industry professionals. Covering the core technologies around which Microsoft’s future will be built, this program provides...

Irresistible! Markets, Models, and Meta-Value in Consumer Electronics
Irresistible! Markets, Models, and Meta-Value in Consumer Electronics
The consumer electronics industry is entering an era of extraordinary growth. The industry’s best companies will ride that wave to unprecedented success. But, today, many CE companies are struggling with business models that are simply untenable. They must change to survive: they must change even more dramatically to win.

...

Writing Effective Use Cases
Writing Effective Use Cases
Writing use cases as a means of capturing the behavioral requirements of software systems and business processes is a practice that is quickly gaining popularity. Use cases provide a beneficial means of project planning because they clearly show how people will ultimately use the system being designed. On the surface, use cases appear to be a...
Perl Best Practices
Perl Best Practices

Many programmers code by instinct, relying on convenient habits or a
"style" they picked up early on. They aren't conscious of all the
choices they make, like how they format their source, the names they use
for variables, or the kinds of loops they use. They're focused entirely
on problems
...

J2EE Security for Servlets, EJBs, and Web Services
J2EE Security for Servlets, EJBs, and Web Services

J2EE developers have an extraordinary array of powerful options for securing their Web services, Web applications, EJB components and RMI objects. Now, expert Java architect Pankaj Kumar helps developers make sense of Java's increasingly rich security APIs, tools, patterns, and best practices-showing how to use each of them in the right place,...

Open Source Development with CVS
Open Source Development with CVS
The need for a modern source-code management strategy in the distributed open-source community is paramount. The benevolent dictatorship model of open-source maintainers is only quasi-stable, but it is far better than the other extreme: the chaos of democratic code development.

The best available compromise is the concurrent versioning system...

Designing Usable Electronic Text (Second Edition)
Designing Usable Electronic Text (Second Edition)
Designing Usable Electronic Text is without question an important resource to all professionals involved in the field of human-computer interaction and user interface designs.
- HCI International News, April 2005

[A]n engaging presentation of elements...

Fundamentals of Speech Recognition
Fundamentals of Speech Recognition

Provides a theoretically sound, technically accurate, and complete description of the basic knowledge and ideas that constitute a modern system for speech recognition by machine. Covers production, perception, and acoustic-phonetic characterization of the speech signal; signal processing and analysis...

Complete Guide to CISM Certification
Complete Guide to CISM Certification

Complete Guide to CISMВ® Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices,...

Managing Virtual Teams: Getting the Most from Wikis, Blogs, and Other Collaborative Tools
Managing Virtual Teams: Getting the Most from Wikis, Blogs, and Other Collaborative Tools
Virtual collaborative team environments face unique challenges because their communication is not face-to-face. Managing Virtual Teams: Getting the Most from Wikis, Blogs, and Other Collaborative Tools provides practical advice for managers of distributed teams who must design the internal systems and meet deadlines with a diverse team, and for...
The Principles of Beautiful Web Design
The Principles of Beautiful Web Design
If you are squeamish about choosing colors, feel uninspired by a blank browser window, or get lost trying to choose the right font, this book is for you. In it, I take a methodical approach to presenting traditional graphic design theory as it applies to today’s web site development industry. While the content is directed toward programmers...
unlimited object storage image
Result Page: 833 832 831 830 829 828 827 826 825 824 823 822 821 820 819 818 817 816 815 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy