Home | Amazing | Today | Tags | Publishers | Years | Search 
PSP Game Creation for Teens
PSP Game Creation for Teens
Games have come a long way since their inception far in our past. The tools we have used in our game play have changed, as well, from knuckle bones to cards to board games to early arcade games to today’s spiffy video game consoles. The progression has been a lengthy one. Now hardware advances are even changing the way we...
Formal Methods and Software Engineering: 6th International Conference on Formal Engineering Methods
Formal Methods and Software Engineering: 6th International Conference on Formal Engineering Methods
Formal engineering methods are changing the way that software systems are developed. With language and tool support, they are being used for automatic code generation, and for the automatic abstraction and checking of implementations. In the future, they will be used at every stage of development: requirements, specification,...
Unity 3.x Game Development Essentials
Unity 3.x Game Development Essentials

When we began creating Unity, we were just three programmers working on a beautiful little game. There weren't any good game engines that one could license without putting down wads of cash, so we created our own. We eventually decided that we enjoyed the challenge of making great tools even more than making games, and after some soul...

Multiparadigm Constraint Programming Languages (Cognitive Technologies)
Multiparadigm Constraint Programming Languages (Cognitive Technologies)

"Modeling" has become one of the primary concerns in modern Software Engineering. The reason is simple: starting development processes from clear and succinct models has proven to foster not only quality but also productivity. With the advance of modeling there also came a desire for automatic code generation from models....

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

The Handbook of Human Factors in Web Design (Human Factors and Ergonomics)
The Handbook of Human Factors in Web Design (Human Factors and Ergonomics)

The Handbook of Human Factors in Web Design covers basic human factors issues relating to screen design, input devices, and information organization and processing, as well as addresses newer features which will become prominent in the next generation of Web technologies. These include multimodal interfaces, wireless capabilities,...

HTML5 Mastery: Semantics, Standards, and Styling
HTML5 Mastery: Semantics, Standards, and Styling

Unless you have been off on a digital-free holiday, you’ve heard a lot of chatter about HTML5. As a web professional, it is apparent that having an understanding of HTML5 is not only beneficial—it’s essential. The future of the Web has radically changed course in the last few years from XHTML to HTML5, which means...

Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems: 7th International Conference
Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems: 7th International Conference

Cutting planes (cuts) are very popular in the OR community, where they are used to strengthen the Linear Programming (LP) relaxation of Mixed-Integer Programs (MIPs) in the hope of improving the performance of an exact LPbased solver. In particular, an intense research effort has been devoted to the study of families of general cuts,...

Lift in Action: The Simply Functional Web Framework for Scala
Lift in Action: The Simply Functional Web Framework for Scala

The web has completely revolutionized the way we live our lives—the average person in the UK now does an average of six Google searches a day. Within the lifetime of one generation, our entire society has changed, and it continues to be catalyzed by technology in a very fundamental way. For me, this is the most fascinating thing...

JBoss AS 7 Configuration, Deployment and Administration
JBoss AS 7 Configuration, Deployment and Administration
As the Java EE standard has evolved and matured, the API has become increasingly rich and complex. The next generation of application servers needs to be modular and configurable to run only specific services or containers. JBoss AS 7 promises to meet those requirements but the configuration of a complex application server is composed of a mix...
Geeks and Geezers
Geeks and Geezers
We were drawn to thinking and then ultimately writing about geeks and geezers from very different starting points. Coauthoring a book isn’t quite like synchronized swimming. It’s more like gaining perspective and depth through incongruity. Through writing and arguing in what seemed like endless and percussive...
Getting Started with OAuth 2.0
Getting Started with OAuth 2.0
I’ve been working with web-based APIs since 1999, building SOAP-based web services for internal IT applications and helping thousands of developers using Google’s RESTbased APIs for Google Calendar, Picasa Web Albums, YouTube, and more. Each of these APIs has required authorization from users to act on their behalf. Developers...
Result Page: 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy