Home | Amazing | Today | Tags | Publishers | Years | Search 
Introduction to Game Programming with C++ (Wordware Game Developer's Library)
Introduction to Game Programming with C++ (Wordware Game Developer's Library)

Introduction to Game Programming with C++ explores the world of game development with a focus on C++. This book begins with an explanation of the basics of mathematics as it relates to game programming, covers the fundamentals of C++, and describes a number of algorithms commonly used in games. In addition, it discusses several...

Securing Converged IP Networks
Securing Converged IP Networks
This book offers advice on a range of critical subjects pertaining to security practices and procedures. Anyone moving toward a converged platform will find the approach beneficial and illuminating.
Phil Norton, Arthur J. Gallagher & Co.

This book delivers a requisite insight for security professionals to understand the scope and...

Intelligent Information Processing and Web Mining: Proceedings of the International IIS: IIPWMВґ05 Conference held in Gdansk, Poland, June 13-16, 2005
Intelligent Information Processing and Web Mining: Proceedings of the International IIS: IIPWMВґ05 Conference held in Gdansk, Poland, June 13-16, 2005
This edited book contains articles accepted for presentation during the conference "Intelligent Information Systems 2005 (IIS 2005) - New Trends in Intelligent Information Processing and Web Mining" held in Gdansk, Poland, on June 13-16, 2005. Special attention is devoted to the newest developments in the areas of Artificial Immune...
Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase
Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase
"Today, databases house our 'information crown jewels', but database security is one of the weakest areas of most information security programs. With this excellent book, Ben-Natan empowers you to close this database security gap and raise your database security bar!" Bruce W. Moulton. CISO/VP, Fidelity Investments (1995 - 2001)...
Excel 2007: Beyond the Manual
Excel 2007: Beyond the Manual
Many experienced users may initially find Excel 2007 rather disorientating. But Excel 2007: Beyond the Manual will introduce those who are already familiar with Excel basics to more advanced features, like consolidation, what-if analysis, PivotTables, sorting and filtering, and some commonly used functions.

You'll learn how to maximize...

Flash: The Future: Pocket PC / DVD / ITV / Video / Game Consoles / Wireless
Flash: The Future: Pocket PC / DVD / ITV / Video / Game Consoles / Wireless
Design simple Flash applications, business applications, and games for pocket PCs; use eVB and eVC to deliver these applications on the PPC without the limitations of Pocket Internet Explorer; create Flash content for playback on DVD; and use Flash to construct interfaces for interactive TV. The CD- ROM includes code and examples from the book plus...
Databases and Information Systems IV:  Selected Papers from the Seventh International Conference DB & IS'2006 - Volume 155
Databases and Information Systems IV: Selected Papers from the Seventh International Conference DB & IS'2006 - Volume 155
This volume contains the best papers presented at the 7th International Baltic Conference on Databases and Information Systems (BalticDB&IS’2006). The series of Baltic DB&IS conferences has been initiated by Janis Bubenko jr. and Arne Solvberg in 1994. The conferences are highly international and bring together academics and...
Computer Network Time Synchronization: The Network Time Protocol
Computer Network Time Synchronization: The Network Time Protocol
This book is all about wrangling a herd of network computers so that all display the correct time. This may seem like a really narrow business, but the issues go far beyond winding the clock on your display taskbar. Carefully coordinated, reliable, and accurate time is vital for traffic control in the air and on the ground, buying and selling...
Encryption in a Windows Environment: EFS File, 802.1x Wireless, IPSec Transport, and S/MIME Exchange
Encryption in a Windows Environment: EFS File, 802.1x Wireless, IPSec Transport, and S/MIME Exchange
With the current business, government, and institutional focus on security, organizations are scrambling to make their networks more secure. Although encryption is nothing new to Windows, recent advances in Microsoft® Windows 2003 and Microsoft® Windows XP have drastically simplified the support of encryption technologies in Windows...
Advances in Enterprise Information Technology Security (Premier Reference)
Advances in Enterprise Information Technology Security (Premier Reference)
In the last decade information and computer security is mainly moving from the confines of academia to the enterprise concerns. As populations become more and more comfortable with the extensive use of networks and the Internet, as our reliance on the knowledge-intensive technology grows, and as progress in the computer software and wireless...
Software Requirement Patterns (Best Practices)
Software Requirement Patterns (Best Practices)
Learn proven, real-world techniques for specifying software requirements with this practical reference. It details 30 requirement "patterns" offering realistic examples for situation-specific guidance for building effective software requirements. Each pattern explains what a requirement needs to convey, offers potential questions to...
Google Analytics 2.0
Google Analytics 2.0

Site Stats on Steroids

Is your Web site serving its purpose? To find out, you need to analyze factors related to what the site is supposed to do. Site statistics give you raw numbers, but Web analytics are like site stats on steroids. Analytics crunch those raw numbers into meaningful metrics—information you...

Result Page: 538 537 536 535 534 533 532 531 530 529 528 527 526 525 524 523 522 521 520 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy