Home | Amazing | Today | Tags | Publishers | Years | Search 
Developing Serious Games (Game Development Series)
Developing Serious Games (Game Development Series)
With the impressive growth the games industry has enjoyed for the past decade, game developers, educators, and marketing firms are excitedly envisioning serious games applications for computer game technologies. These applications- serious games- represent opportunities for game developers to apply their talents to areas outside of the...
Practical UML Statecharts in C/C++, Second Edition: Event-Driven Programming for Embedded Systems
Practical UML Statecharts in C/C++, Second Edition: Event-Driven Programming for Embedded Systems
Streamline your embedded code projects with just one book - Miro Samek presents UML statecharts - a practical, time-saving design methodology!

Practical UML Statecharts in C/C++ Second Edition bridges the gap between high-level abstract concepts of the Unified Modeling Language (UML) and the actual programming aspects of modern
...
Ultra-Low Energy Wireless Sensor Networks in Practice: Theory, Realization and Deployment
Ultra-Low Energy Wireless Sensor Networks in Practice: Theory, Realization and Deployment

Finally a book on Wireless Sensor Networks that covers real world applications and contains practical advice!

Kuorilehto et al. have written the first  practical guide to wireless sensor networks. The authors draw on their experience in the development and field-testing of autonomous wireless sensor...

Analysis and Design of Information Systems
Analysis and Design of Information Systems
In any software design project, the analysis stage - documenting and designing technical requirements for the needs of users - is vital to the success of the project.

This third edition of the successful Analysis and Design of Information Systems provides a comprehensive introduction and user-friendly survey to all aspects of business...

Sams Teach Yourself Django in 24 Hours
Sams Teach Yourself Django in 24 Hours
In just 24 lessons of one hour or less, you will be able to build full-featured production websites using Django, the powerful web development framework based on Python.

 

Designed for experienced website developers who have at least some familiarity with the Python programming language,...

Mainframe Basics for Security Professionals: Getting Started with RACF
Mainframe Basics for Security Professionals: Getting Started with RACF
Security—it comes in many forms in the IT world: physical security around a data center, user ID authentication when a transaction gets executed, access control against a database, audit records for anomaly detection. All these forms can be bought and paid for, yet, one element must be taught. That is, the human, the person who administers...
Oracle Essentials: Oracle Database 11g
Oracle Essentials: Oracle Database 11g
Oracle is an enormous system, with myriad technologies, options, and releases. Most users-even experienced developers and database administrators-find it difficult to get a handle on the full scope of the Oracle database. And, as each new Oracle version is released, users find themselves under increasing pressure to learn about a whole range of new...
Network Security Assessment: Know Your Network
Network Security Assessment: Know Your Network
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this...
Database and XML Technologies: First International XML Database Symposium, XSYM 2003, Berlin, Germany, September 8, 2003, Proceedings
Database and XML Technologies: First International XML Database Symposium, XSYM 2003, Berlin, Germany, September 8, 2003, Proceedings
This book constitutes the refereed proceedings of the First International XML Database Symposium, XSym 2003, held in Berlin, Germany in September 2003.

The 18 revised full papers presented were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on XML-relational database management systems, XML...

A Practical Guide to Trusted Computing
A Practical Guide to Trusted Computing
Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable

 

Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes...

Software Defined Radio: The Software Communications Architecture (Wiley Series in Software Radio)
Software Defined Radio: The Software Communications Architecture (Wiley Series in Software Radio)

The Software Communications Architecture (SCA) establishes an implementation-independent framework for the development of Joint Tactical Radio System software configurable radios. It specifies the Operating Environment, services and interfaces that applications use.

Software Defined Radio: The Software...

Test and Analysis of Web Services
Test and Analysis of Web Services
The service-oriented approach has become more and more popular, now allowing highly integrated and yet heterogeneous applications. Web services are the natural evolution of conventional middleware technologies to support Web-based and enterprise-level integration.

The highly dynamic characteristics of service-oriented applications means...

Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy