Programming is a fascinating and challenging subject. Unfortunately, it is rarely presented as such. Most often it is taught by "induction": features of some famous programming languages are given operational meaning (e.g. a loop "goes round and round"), a number of examples are shown, and by induction, we are asked to...
Only Unity fits the bill of being a game engine that allows you to create a full 3D game for free, and with phenomenal community support. This book will equip you with the skills to create professional looking games at no cost.
Unity 3 Game Development Hotshot will teach you how to exploit the full array of Unity 3D's...
Knowledge Management is fast becoming a hot topic of discussion and
research. The capture, use, production and storage of knowledge is an issue of
paramount importance for businesses, universities, public and private organizations.
Because this is such an important topic, it is essential for researchers, academicians
and managers to...
Recent advances in digital communications and storage technologies
have brought major changes for consumers. High-capacity hard disks
and DVDs can store large amounts of audiovisual data. In addition, faster
Internet connection speeds and the emerging high bitrate DSL connections
provide sufficient bandwidth for entertainment...
Concurrent processes can exhibit extremely complicated behavior, and
neither informal reasoning nor testing is reliable enough to establish their
correctness. In this thesis, we develop a new technique for the verification
of parallel programs. The technique is stated in terms of axioms and inference
rules, and it is used to prove...
FreeNAS is a free piece of software that turns a PC into Network Attached Storage (NAS). It supports connections from Microsoft Windows, Apple OS X, Linux, and FreeBSD. It supports RAID, has a simple web GUI, and modest system requirements. Since FreeNAS is an embedded operating system, it is compact, efficient, and dedicated to just one...
The world of hacking is a world of pain and frustration. Frustration for the hacker as
he tries to figure out how to break the latest and greatest security device, and pain for
the manufacturer or corporation that made or was relying on that device.
Dissecting the Hack is one heck of a ride! Hackers, IT professional, and...
"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...
Computers are at the heart of most activities nowadays. A processor is the central component of
a computer, but nowadays, we can find processors embedded in many other components, such as
game consoles, consumer electronic devices and cars, just to mention a few.
This lecture presents a thorough study of the microarchitecture...
Android is everywhere. Phones. Tablets. TVs and set-top boxes powered by Google TV.
Soon, Android will be in cars and all sort of other places as well.
However, the general theme of Android devices will be smaller screens and/or no
hardware keyboard. And, by the numbers, Android will probably be associated mostly
with smartphones for...
Microsoft Visual Basic for Applications (VBA) is an exceptional programming language and
environment. The language has grown out of a need to have a programming language that
would allow more business-focused individuals to write programs, but equally support the
programming features that developers look for in a product. The...
Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient.Ian Mann turns the black art of...