Home | Amazing | Today | Tags | Publishers | Years | Search 
XNA 4.0 Game Development by Example: Beginner's Guide - Visual Basic Edition
XNA 4.0 Game Development by Example: Beginner's Guide - Visual Basic Edition

The Microsoft XNA Framework provides a powerful set of tools to allow development teams of any size, from the individual developer to larger independent teams, to rapidly develop high-performance quality games for multiple Microsoft-related platforms.

This book will present a series of video games, utilizing Visual Basic and...

Introducing HTML5 Game Development
Network Defense: Perimeter Defense Mechanisms
Network Defense: Perimeter Defense Mechanisms

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Combinatorial Algorithms: 22th International Workshop, IWOCA 2011
Combinatorial Algorithms: 22th International Workshop, IWOCA 2011

This volume contains the papers presented at IWOCA 11: the 22nd International

Workshop on Combinatorial Algorithms
 
The 22nd IWOCA was held July 20–22, 2011 on the green and spacious campus of the University of Victoria (UVic), itself located on green and spacious Vancouver...
Artificial Intelligence in Recognition and Classification of Astrophysical and Medical Images (Studies in Computational Intelligence)
Artificial Intelligence in Recognition and Classification of Astrophysical and Medical Images (Studies in Computational Intelligence)
During the past decade digital imaging has significantly progressed in all imaging areas ranging from medicine, pharmacy, chemistry, biology to astrophysics, meteorology and geophysics. The avalanche of digitized images produced a need for special techniques of processing and knowledge extraction from many digital images with...
Depth Map and 3D Imaging Applications: Algorithms and Technologies
Depth Map and 3D Imaging Applications: Algorithms and Technologies
This book has three editors, and all of us are involved in image processing and computer vision research. We have contributed to the 3D imaging research, especially in the field of passive optical 3D shape recovery methods. Over the last decade, significant progress had been made in 3D imaging research. As a result, 3D imaging...
Autonomous Intelligent Vehicles: Theory, Algorithms, and Implementation (Advances in Computer Vision and Pattern Recognition)
Autonomous Intelligent Vehicles: Theory, Algorithms, and Implementation (Advances in Computer Vision and Pattern Recognition)
Over the years, the field of intelligent vehicles has become a major research theme in intelligent transportation systems since traffic accidents are serious and growing problems all over the world. The goal of an intelligent vehicle is to augment vehicle autonomous driving either entirely or partly for the purposes of safety,...
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Wireless Crime and Forensic Investigation
Wireless Crime and Forensic Investigation

Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the...

Advances in Information Retrieval: 31th European Conference on IR Research, ECIR 2009, Toulouse, France
Advances in Information Retrieval: 31th European Conference on IR Research, ECIR 2009, Toulouse, France
These proceedings contain the papers presented at ECIR 2009, the 31st European Conference on Information Retrieval. The conference was organized by the Institut de Recherche en Informatique de Toulouse (IRIT), in cooperation with the Information Retrieval Specialist Group of the British Computer Society (BCS-IRSG) and was...
Understanding Complex Datasets: Data Mining with Matrix Decompositions
Understanding Complex Datasets: Data Mining with Matrix Decompositions
Many data-mining algorithms were developed for the world of business, for example for customer relationship management. The datasets in this environment, although large, are simple in the sense that a customer either did or did not buy three widgets, or did or did not fly from Chicago to Albuquerque.

In contrast,
...
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Penetration testers are faced with a combination of firewalls, intrusion detection systems, host-based protection, hardened systems, and teams of knowledgeable analysts that pour over data collected by their security information management systems. In an environment such as this, simply running automated tools will typically...
Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy