Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Java Game Programming
Advanced Java Game Programming

Advanced Java Game Programming teaches you how to create desktop and Internet computer games using the latest Java programming language techniques. Whereas other Java game programming books focus on introductory Java material, this book covers game programming for experienced Java developers.

David Wallace...

Salvador Dali (Best of)
Salvador Dali (Best of)
Salvador Dalí (1904-1989) is best known for his unique and striking style with an extraordinary repertoire reaching out across film, painting, photography, and sculpture. Whilst his name may be most commonly associated with Surrealism, Dalí consummately displayed mastery over such broad genres as classical, modernist, and Cubist...
Programming Groovy 2: Dynamic Productivity for the Java Developer (Pragmatic Programmers)
Programming Groovy 2: Dynamic Productivity for the Java Developer (Pragmatic Programmers)

Groovy brings you the best of both worlds: a flexible, highly productive, agile, dynamic language that runs on the rich framework of the Java Platform. Groovy preserves the Java semantics and extends the JDK to give you true dynamic language capabilities. Programming Groovy 2 will help you, the experienced Java developer, learn and...

Block Trace Analysis and Storage System Optimization: A Practical Approach with MATLAB/Python Tools
Block Trace Analysis and Storage System Optimization: A Practical Approach with MATLAB/Python Tools
Understand the fundamental factors of data storage system performance and master an essential analytical skill using block trace via applications such as MATLAB and Python tools. You will increase your productivity and learn the best techniques for doing specific tasks (such as analyzing the IO pattern in a quantitative way, identifying the...
Cryptography in C and C++
Cryptography in C and C++
  • Detailed treatment of public key cryptography with detailed coverage of the RSA algorithm that is now in the public domain
  • Explains and includes an implementation of Rijndael, the new American Encryption Standard in both C and C++
  • Not toy code(tm), but a practical treatment of modern cryptographic...
Mac OS X Help Line, Tiger Edition
Mac OS X Help Line, Tiger Edition
With every update, Mac OS X grows more powerful, more dependable, and easier to use--and Mac OS X Tiger is no exception. But along with the new features come fresh issues--new areas to troubleshoot, new functionality to unravel, and new glitches waiting to confound even the savviest Mac users. Not to worry. Best-selling author and Mac guru Ted...
Programming Excel with VBA and .NET
Programming Excel with VBA and .NET

Why program Excel? For solving complex calculations and presenting results, Excel is amazingly complete with every imaginable feature already in place. But programming Excel isn't about adding new features as much as it's about combining existing features to solve particular problems. With a few modifications, you can transform...

Mastering Mambo: E-Commerce, Templates, Module Development, SEO, Security, and Performance
Mastering Mambo: E-Commerce, Templates, Module Development, SEO, Security, and Performance
If you type "Mambo" into a search engine, you get a ton of hits. Testing this with Google
resulted in almost six million references. But only some of these concerned themselves with the Afro-Cuban style of music and dance made popular by the movie Dirty Dancing. Most lead to one of today's most popular content management systems,
...
First Look 2007 Microsoft  Office System
First Look 2007 Microsoft Office System
Your wishes are granted! The new release that is the focus of this book—2007 Microsoft Office
system—has been designed to answer just these kinds of needs for people working with information
the world over. The 2007 release not only offers better integration, enhanced communication,
professional presentation, and expanded
...
Instructional Engineering in Networked Environments (Tech Training Series)
Instructional Engineering in Networked Environments (Tech Training Series)
A Dynamic, Research-Based Approach to Knowledge Management

In this book, Gilbert Paquette–an internationally recognized expert in the field of technology-based training–offers IT professionals, trainers, and consultants a revolutionary method for going beyond simple information management. Instructional Engineering in Networked...

AdvancED ActionScript Components: Mastering the Flash Component Architecture
AdvancED ActionScript Components: Mastering the Flash Component Architecture
Macromedia's architecture is like a chest filled with precious jewels, and this book is quite simply the key to open it! One of the most important tools provided with Flash is the Macromedia Component Architecture: a framework of components written in ActionScript 2, based on established design patterns, that provides a wealth of functionality you...
Perfect Passwords: Selection, Protection, Authentication
Perfect Passwords: Selection, Protection, Authentication
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.

Every computer user must face the problems of password security. According
...
unlimited object storage image
Result Page: 228 227 226 225 224 223 222 221 220 219 218 217 216 215 214 213 212 211 210 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy