Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning RPG Maker VX Ace
Beginning RPG Maker VX Ace

Beginning RPG Maker VX Ace takes you through the process of using the RPG Maker VX Ace game development engine to create your very own role playing game. The book has been designed with the complete beginner in mind who has little to no experience with the engine. Tutorials and exercises will take you from installing the software to...

Python Data Visualization Cookbook - Second Edition
Python Data Visualization Cookbook - Second Edition

Over 70 recipes to get you started with popular Python libraries based on the principal concepts of data visualization

About This Book

  • Learn how to set up an optimal Python environment for data visualization
  • Understand how to import, clean and organize your data
  • Determine...
Investigating Computer-Related Crime
Investigating Computer-Related Crime
Written by an experienced information security specialist, Investigating Computer-Related Crime is tailored to the needs of corporate information professionals and investigators. It gives a step-by-step approach to understanding and investigating security problems, and offers the technical information, legal information, and computer forensic...
Perspectives Of LHC Physics
Perspectives Of LHC Physics
The Large Hadron Collider (LHC), located at CERN, Geneva, Switzerland, will be the world's largest and highest energy and highest intensity particle accelerator. Here is a timely book with several perspectives on the hoped-for discoveries from the LHC.

This book provides an overview on the techniques that will be crucial for finding new...

C# in Depth, 3rd Edition
C# in Depth, 3rd Edition

Summary

C# in Depth, Third Edition updates the best-selling second edition to cover the new features of C# 5, including the challenges of writing maintainable asynchronous code. It preserves the uniquely insightful look into the tricky areas and dusty corners of C# that only expert Jon Skeet can...

Data Mining with Microsoft SQL Server 2000 Technical Reference
Data Mining with Microsoft SQL Server 2000 Technical Reference
With its state-of-the-art capabilities for rapidly processing and retrieving huge quantities of data, Microsoft® SQL Server 2000 is quickly growing in popularity among large corporations. But learning how to take advantage of the powerful, built-in data-mining services in SQL Server to turn all that data into meaningful information takes time...
Total Leopard: The Macworld OS X 10.5 Superguide
Total Leopard: The Macworld OS X 10.5 Superguide
Get up to Speed with Mac OS X 10.5

Nobody spends more time with Apple's computers and software than the writers and editors at Macworld, the world's foremost Mac authority. Now Macworld's team of experts take you inside Apple's latest operating system, Mac OS X 10.5, to help you master important new features, discover hidden...

Frommer's Singapore & Malaysia (Frommer's Complete)
Frommer's Singapore & Malaysia (Frommer's Complete)
Come along with Frommer's and discover two of Asia's most intriguing destinations. Our author has scoured every inch of this region, and she'll share her cultural insights and favorite discoveries with you. Her guide is much more complete and in-depth than its major competitor.

In Singapore, you'll find the best places to stay, from...

Meetings with Remarkable Men (All and Everything)
Meetings with Remarkable Men (All and Everything)
Meetings with Remarkable Men, G. I. Gurdjieff’s autobiographical account of his youth and early travels, has become something of a legend since it was first published in 1963. A compulsive “read” in the tradition of adventure narratives, but suffused with Gurdjieff’s unique perspective on life, it is organized...
Learning Apache Mahout Classification
Learning Apache Mahout Classification

Build and personalize your own classifiers using Apache Mahout

About This Book

  • Explore the different types of classification algorithms available in Apache Mahout
  • Create and evaluate your own ready-to-use classification models using real world datasets
  • A practical guide to...
Upgrading and Repairing Laptop Computers
Upgrading and Repairing Laptop Computers
Beyond cutting edge, Scott Mueller goes where no computer book author has gone before--right past all the warranty stickers, the hidden screws, and the fear factor to produce a real owner's manual that every laptop owner should have on his desk. This book shows the upgrades users can perform, the ones that are better left to the manufacturer,...
Introduction to Cryptography with Java Applets
Introduction to Cryptography with Java Applets
Cryptography is the art of secret writing. It involves transforming information into apparently unintelligible garbage so that unwanted eyes will be unable to comprehend it. This transformation, however, must be done so that it is reversible, so that individuals intended to view the information may do so. This is the traditional use of...
unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy