Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Game Analytics: Maximizing the Value of Player Data
Game Analytics: Maximizing the Value of Player Data

Developing a successful game in today’s market is a challenging endeavor. Thousands of titles are published yearly, all competing for players’ time and attention. Game analytics has emerged in the past few years as one of the main resources for ensuring game quality, maximizing success, understanding player behavior and enhancing...

F.C.U.K Your Way to Success: The Art of Maximising Results With Minimum Effort
F.C.U.K Your Way to Success: The Art of Maximising Results With Minimum Effort
Sometimes the story of how something happened (or was created) is as interesting as the thing itself. This is very true in the case of this book.

When Karen Leong, my co-director at Influence Solutions Pte Ltd, and I entered the Learning and Development (L&D) arena, it did not take us long to realize that CHANGE and
...
Textbook of Neuroanaesthesia and Critical Care
Textbook of Neuroanaesthesia and Critical Care

Neuroanaesthesia is perhaps the branch of anaesthesia in which the expertise and competence of the anaesthetist can most significantly influence patient outcome. High quality research has driven clinical practice and led to an increasingly multimodal and multidisciplinary approach to patient care. All aspects of the modern practice of...

Phpeclipse: A User Guide
Phpeclipse: A User Guide
The PHP language has come a long way from its humble roots as a set of Perl scripts written by
Rasmus Lerdorf. Today, PHP enjoys enormous market share and the latest release, PHP 5, sports a
robust object-oriented programming model. Naturally, development practices have also matured.
Those of us who taught ourselves PHP in the late
...
Hack I.T.: Security Through Penetration Testing
Hack I.T.: Security Through Penetration Testing
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
Fundamental Numerical Methods for Electrical Engineering (Lecture Notes in Electrical Engineering)
Fundamental Numerical Methods for Electrical Engineering (Lecture Notes in Electrical Engineering)
Stormy development of electronic computation techniques (computer systems and software), observed during the last decades, has made possible automation of data processing in many important human activity areas, such as science, technology, economics and labor organization. In a broadly understood technology area, this development led to separation...
Universe (Britannica Illustrated Science Library)
Universe (Britannica Illustrated Science Library)

There was a time when people believed that the stars were bonfires lit by other tribes in the sky, that the universe was a flat plate resting on the shell of a giant turtle, and that the Earth, according to the Greek astronomer Ptolemy, was at the center of the universe. From the most remote of times, people have been curious...

Water Dynamics in Plant Production
Water Dynamics in Plant Production
The source of life is water. Life began in the oceans, which represent the largest stock of water on Earth. Much less water is stored below the land surface in the form of fresh groundwater, amounting to not quite 0.8% of the earth’s total water reserves, while lakes and rivers combined only contribute a further...
Java(TM) Native Interface: Programmer's Guide and Specification
Java(TM) Native Interface: Programmer's Guide and Specification

The Java Native Interface (JNI) enables the integration of code written in the Java programming language with code written in other languages such as C and C++. It allows programmers to take full advantage of the Java platform without having to abandon their investment in legacy code.

This book is the definitive resource and a...

19 Deadly Sins of Software Security (Security One-off)
19 Deadly Sins of Software Security (Security One-off)

This essential book for all software developers--regardless of platform, language, or type of application--outlines the “19 deadly sins” of software security and shows how to fix each one. Best-selling authors Michael Howard and David LeBlanc, who teach Microsoft employees how to secure code, have partnered with John Viega, the man...

Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010

The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...

Breast Cancer Management and Molecular Medicine
Breast Cancer Management and Molecular Medicine

Tailoring treatment for individual breast cancers is no longer a dream and is now the main goal for current research. This book gives an overview of the most recent techniques, agents and approaches for breast cancer and the individualization of treatment. Particular attention is given to organ-specific tailored approaches, specific...

unlimited object storage image
Result Page: 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy