Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Game Programming Using QT
Game Programming Using QT

A complete guide to designing and building fun games with Qt and Qt Quick 2 using associated toolsets

About This Book

  • Learn to create simple 2D to complex 3D graphics and games using all possible tools and widgets available for game development in Qt
  • Understand technologies such as QML,...
The Power PC Compiler Writer's Guide
The Power PC Compiler Writer's Guide
This book describes, mainly by coding examples, the code patterns that perform well on PowerPC processors. The book will be particularly helpful to compiler developers and application-code specialists who are already familiar with optimizing compiler technology and are looking for ways to exploit the PowerPC architecture. It will also be helpful to...
The Mac Hacker's Handbook
The Mac Hacker's Handbook
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat...
Spatial Augmented Reality: Merging Real and Virtual Worlds
Spatial Augmented Reality: Merging Real and Virtual Worlds

Like virtual reality, augmented reality is becoming an emerging platform in new application areas for museums, edutainment, home entertainment, research, industry, and the art communities using novel approaches which have taken augmented reality beyond traditional eye-worn or hand-held displays.

In this book, the authors discuss spatial...

Principles of Cybercrime
Principles of Cybercrime

We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually every...

Microsoft Visual C++ .NET Step by Step - Version 2003
Microsoft Visual C++ .NET Step by Step - Version 2003

Teach yourself the latest version of Visual C++--and begin developing for Microsoft .NET—one step at a time. This practical, hands-on tutorial expertly guides you through the fundamentals—from writing managed code to running and debugging your first .NET-based applications and XML Web services. Work at your own pace through...

Writing GNU Emacs Extensions
Writing GNU Emacs Extensions

Yes, it is possible to be all things to all people, if you're talking about the Emacs editor. As a user, you can make any kind of customization you want, from choosing the keystrokes that invoke your favorite commands to creating a whole new work environment that looks like nothing ever developed before. It's all in Emacs Lisp -- and...

Iris Biometric Model for Secured Network Access
Iris Biometric Model for Secured Network Access

In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems.

Iris Biometric Model for Secured Network Access proposes a
...

Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • ...
Pro OpenSolaris
Pro OpenSolaris
OpenSolaris is a rapidly evolving operating system with roots in Solaris 10, suitable for deployment on laptops, desktop workstations, storage appliances, and data center servers from the smallest single–purpose systems to the largest enterprise–class systems. The growing OpenSolaris community now has hundreds of thousands of...
Bioinformatics: High Performance Parallel Computer Architectures (Embedded Multi-Core Systems)
Bioinformatics: High Performance Parallel Computer Architectures (Embedded Multi-Core Systems)

New sequencing technologies have broken many experimental barriers to genome scale sequencing, leading to the extraction of huge quantities of sequence data. This expansion of biological databases established the need for new ways to harness and apply the astounding amount of available genomic information and convert it into substantive...

The Design of Everyday Things: Revised and Expanded Edition
The Design of Everyday Things: Revised and Expanded Edition
Even the smartest among us can feel inept as we fail to figure out which light switch or oven burner to turn on, or whether to push, pull, or slide a door. The fault, argues this ingenious—even liberating—book, lies not in ourselves, but in product design that ignores the needs of users and the principles of cognitive...
unlimited object storage image
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy