Home | Amazing | Today | Tags | Publishers | Years | Search 
Beginning Android Tablet Games Programming (Beginning Apress)
Beginning Android Tablet Games Programming (Beginning Apress)
This book teaches you to create your own games for Android 3.0 tablets. After reading and working through its examples, you’ll have gained command over the sensors, touchscreen, network capabilities, and processing power of the many new tablet computers. Does that sound daunting? It isn’t. Instead of going through the...
Oracle Database Performance and Scalability: A Quantitative Approach
Oracle Database Performance and Scalability: A Quantitative Approach

This book stemmed from the author’s other book—Software Performance and Scalability: a Quantitative Approach, published by Wiley in 2009. That book helps

readers grasp the basic concepts, principles, methodologies, best practices, queueing theories, and profiling tools associated with optimizing software performance and...

Understanding Operating Systems
Understanding Operating Systems
This book explains a very technical subject in a not-so-technical manner, putting the concepts of operating systems into a format that students can quickly grasp.

For those new to the subject, this text demonstrates what operating systems are, what they do, how they do it, how their performance can be evaluated, and
...
Machine Learning for Hackers
Machine Learning for Hackers

To explain the perspective from which this book was written, it will be helpful to define the terms machine learning and hackers.

What is machine learning? At the highest level of abstraction, we can think of machine learning as a set of tools and methods that attempt to infer patterns and extract insight from a record of the...

Google Script: Enterprise Application Essentials: Adding Functionality to Your Google Apps
Google Script: Enterprise Application Essentials: Adding Functionality to Your Google Apps

If you are reading this book, there is a good chance you have heard of Google and its powerful office productivity suite, Google Apps. Google offers search, email, word processing, and hundreds of other cloud applications and services that can be available to the individual and can scale all the way up to massive corporations and...

The Handbook of MPEG Applications: Standards in Practice
The Handbook of MPEG Applications: Standards in Practice

The need for compressed and coded representation and transmission of multimedia data has not rescinded as computer processing power, storage, and network bandwidth have increased. They have merely served to increase the demand for greater quality and increased functionality from all elements in the multimedia delivery and consumption...

Structural Failure Models for Fault-Tolerant Distributed Computing (Software Engineering Research)
Structural Failure Models for Fault-Tolerant Distributed Computing (Software Engineering Research)

Despite means of fault prevention such as extensive testing or formal verification, errors inevitably occur during system operation. To avoid subsequent system failures, critical distributed systems, therefore, require engineering of means for fault tolerance. Achieving fault tolerance requires some redundancy, which, unfortunately,...

XNA 4.0 Game Development by Example: Beginner's Guide - Visual Basic Edition
XNA 4.0 Game Development by Example: Beginner's Guide - Visual Basic Edition

The Microsoft XNA Framework provides a powerful set of tools to allow development teams of any size, from the individual developer to larger independent teams, to rapidly develop high-performance quality games for multiple Microsoft-related platforms.

This book will present a series of video games, utilizing Visual Basic and...

Pro jQuery
Pro jQuery

At its heart, jQuery does something that sounds pretty dull: it lets you modify the contents of HTML documents by manipulating the model that the browser creates when it processes the HTML (known as DOM manipulation, as I’ll explain later). If you are reading this, you have probably already done some DOM manipulation, either using...

Managed Code Rootkits: Hooking into Runtime Environments
Managed Code Rootkits: Hooking into Runtime Environments

We live in a world in which we can’t trust our computers. For example, how can we know for sure that our hardware manufacturer did not hide malicious code in the system’s microchip? Or that our freshly installed operating system does not contain backdoors created by a rogue developer from the OS development team?

...

C: How to Program (6th Edition)
C: How to Program (6th Edition)

Welcome to the C programming language—and to C++, too! This book presents leadingedge computing technologies for students, instructors and software development professionals.

At the heart of the book is the Deitel signature “live-code approach.” Concepts are presented in the context of complete working...

Beginning OS X Lion Apps Development (Beginning Apress)
Beginning OS X Lion Apps Development (Beginning Apress)

Mac OS X offers an amazing development environment for scores of technologies. It seems that developers from numerous camps are migrating to Mac en masse. Scan the room at any Ruby or Rails conference, for example, and you’ll see programmers coding on Macs almost exclusively. As developers move to Mac, almost inevitably they...

Result Page: 223 222 221 220 219 218 217 216 215 214 213 212 211 210 209 208 207 206 205 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy