Home | Amazing | Today | Tags | Publishers | Years | Search 
HTML5 Games Most Wanted: Build the Best HTML5 Games
HTML5 Games Most Wanted: Build the Best HTML5 Games

HTML5 Games Most Wanted gathers the top HTML5 games developers and reveals the passion they all share for creating and coding great games. You'll learn programming tips, tricks, and optimization techniques alongside real-world code examples that you can use in your own projects. You won't just make...

Risk Management in Software Development Projects (Computer Weekly Professional)
Risk Management in Software Development Projects (Computer Weekly Professional)
A recent paper by the author, ‘Risk in Software Projects’ (in Management Services, October 2001), briefly referred to risk mitigation and its role in the risk management process. Publication of this paper prompted considerable discussion and requests for further information, particularly on software projects in...
The Hoover Dam (Building America: Then and Now)
The Hoover Dam (Building America: Then and Now)
The time was the early 1930s, the president was Herbert Hoover, and the situation in the United States looked bleak. The stock market had crashed in 1929, and most Americans were hurt by the Great Depression, which left a majority of them jobless, homeless, and penniless. But in the West, a beacon of hope was in the...
Pediatric Endocrinology, Fifth Edition, Volume One: Obesity, Diabetes Mellitus, Insulin Resistance, and Hypoglycemia
Pediatric Endocrinology, Fifth Edition, Volume One: Obesity, Diabetes Mellitus, Insulin Resistance, and Hypoglycemia
The fifth edition of Pediatric Endocrinology marks the 22nd anniversary of this textbook. This edition has built upon the accumulated experience of the previous versions and every one of the chapters has been thoroughly updated; thereby its content enhances the reputation that Pediatric Endocrinology has enjoyed as...
The Networked Supply Chain: Applying Breakthrough BPM Technology to Meet Relentless Customer Demands
The Networked Supply Chain: Applying Breakthrough BPM Technology to Meet Relentless Customer Demands
This cutting-edge book illustrates how to implement a new breakthrough BPM technology that makes the vision of the networked enterprise a reality. BPM is changing the competitive business landscape. This breakthrough technology provides businesses with the means to manage processes across systems, people, and organizations, providing...
ASP.NET MVC 4 Mobile App Development
ASP.NET MVC 4 Mobile App Development

The ASP.NET MVC 4 framework is used to build scalable web applications with the help of design patterns and .NET Framework. The Model-View-Controller (MVC) is a design principle which separates the components of a web application. This separation helps you to modify, develop, and test different components of a web application.

...

Pro ASP.NET 4.5 in VB
Pro ASP.NET 4.5 in VB

ASP.NET 4.5 remains Microsoft's preferred technology for creating dynamic websites, providing developers with unrivaled power and flexibility.

Pro ASP.NET 4.5 in VB is the most complete reference to ASP.NET that you will find. This comprehensively revised fifth edition will teach you everything you need to know
...

Pro JPA 2
Pro JPA 2

Pro JPA 2, Second Edition introduces, explains, and demonstrates how to use the new Java Persistence API (JPA) 2.1 from the perspective of one of the specification creators. A one-of-a-kind resource, it provides both theoretical and extremely practical coverage of JPA usage for both beginning and advanced...

The Corporation: The Pathological Pursuit of Profit and Power
The Corporation: The Pathological Pursuit of Profit and Power

In this compelling opus on reform, driven by extensive research, authoritative anecdotes, and insider interviews, eminent law professor and legal theorist Joel Bakan points out that as a legal and economic entity, the modern corporation is essentially pathological in nature, placing the profit motive above any social value or accountability....

Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization
Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization

The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a...

Programming Microsoft SQL Server 2012
Programming Microsoft SQL Server 2012

Your essential guide to key programming features in Microsoft® SQL Server® 2012

Take your database programming skills to a new level—and build customized applications using the developer tools introduced with SQL Server 2012. This hands-on reference shows you how to design, test, and deploy SQL...

Learning Android Game Programming: A Hands-On Guide to Building Your First Android Game
Learning Android Game Programming: A Hands-On Guide to Building Your First Android Game

In early 2010 the availability of powerful and free 2D game engines for the Android

platform was an almost empty field. Today, developers can pick from a few engines that best fit the purpose of unleashing their individual creativity.

With currently more than 500,000 Android devices being
...
Result Page: 20 19 18 17 16 15 14 13 12 11 10 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy