Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Android Game Programming by Example
Android Game Programming by Example

Harness the power of the Android SDK by building three immersive and captivating games

About This Book

  • Implement the critical main game loop and structure your games to enable an array of advanced features
  • Animate your characters with sprite sheets, add multiple scrolling parallax...
Python Programming for the Absolute Beginner, 3rd Edition
Python Programming for the Absolute Beginner, 3rd Edition

If you are new to programming with Python and are looking for a solid introduction, this is the book for you. Developed by computer science instructors, books in the "for the absolute beginner" series teach the principles of programming through simple game creation. You will acquire the skills that you need for practical Python...

Control of Noise and Structural Vibration: A MATLAB®-Based Approach
Control of Noise and Structural Vibration: A MATLAB®-Based Approach
Control of Noise and Structural Vibration presents a MATLAB®-based approach to solving the problems of undesirable noise generation and transmission by structures and of undesirable vibration within structures in response to environmental or operational forces. The fundamentals of acoustics, vibration and coupling between vibrating...
Hands-On Automated Machine Learning: A beginner's guide to building automated machine learning systems using AutoML and Python
Hands-On Automated Machine Learning: A beginner's guide to building automated machine learning systems using AutoML and Python

Automate data and model pipelines for faster machine learning applications

Key Features

  • Build automated modules for different machine learning components
  • Understand each component of a machine learning pipeline in depth
  • Learn to use different open source...
Hands-On Neural Networks with Keras: Design and create neural networks using deep learning and artificial intelligence principles
Hands-On Neural Networks with Keras: Design and create neural networks using deep learning and artificial intelligence principles

Your one-stop guide to learning and implementing artificial neural networks with Keras effectively

Key Features

  • Design and create neural network architectures on different domains using Keras
  • Integrate neural network models in your applications using this highly practical...
Java 9 Dependency Injection: Write loosely coupled code with Spring 5 and Guice
Java 9 Dependency Injection: Write loosely coupled code with Spring 5 and Guice

Create clean code with Dependency Injection principles

Key Features

  • Use DI to make your code loosely coupled to manage and test your applications easily on Spring 5 and Google Guice
  • Learn the best practices and methodologies to implement DI
  • Write more...
Mastering Ext JS
Mastering Ext JS

In this book you'll learn to develop a complete application with ExtJS. Enhance your existing skills and get a better grasp of the JavaScript framework to create advanced Internet applications.

Overview

  • Build an application with Ext JS from scratch
  • Learn expert tips and...
ASP.NET Core 5 and Angular: Full-stack web development with .NET 5 and Angular 11, 4th Edition
ASP.NET Core 5 and Angular: Full-stack web development with .NET 5 and Angular 11, 4th Edition

Build robust modern web applications using .NET 5, Entity Framework Core, and Angular 11

Key Features

  • Updated with the latest features and additions in ASP.NET Core 5 and Angular 11
  • Design, build, and deploy a Single Page Application or Progressive Web App
  • ...
Preventing Web Attacks with Apache
Preventing Web Attacks with Apache

The only end-to-end guide to securing Apache Web servers and Web applications

Apache can be hacked. As companies have improved perimeter security, hackers have increasingly focused on attacking Apache Web servers and Web applications....

Managing Security with Snort and IDS Tools
Managing Security with Snort and IDS Tools
This practical guide to managing network security covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive resource for monitoring illegal entry attempts, ...
Mobile Messaging Technologies and Services: SMS, EMS and MMS
Mobile Messaging Technologies and Services: SMS, EMS and MMS
Mobile messaging is practically the first data communication service in the wireless domain. It is a major advance on the conventional practice of providing only voice communication service over the wireless interface. Thus, mobile messaging is the initial step to bring the Internet to wireless terminals and has considerable importance both for...
.NET Multithreading
.NET Multithreading
With an understanding of the .NET framework, stable and robust multithreaded applications can be developed with minimal effort. Covering the topics related to multithreaded development, this book not only focuses on how a task is performed but also on the more important question of why these tasks are performed. The strengths and weaknesses of each...
unlimited object storage image
Result Page: 329 328 327 326 325 324 323 322 321 320 319 318 317 316 315 314 313 312 311 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy