 |
|
 Developing Serious Games (Game Development Series)With the impressive growth the games industry has enjoyed for the past decade, game developers, educators, and marketing firms are excitedly envisioning serious games applications for computer game technologies. These applications- serious games- represent opportunities for game developers to apply their talents to areas outside of the... |  |  |  |  |
|
 Analysis and Design of Information SystemsIn any software design project, the analysis stage - documenting and designing technical requirements for the needs of users - is vital to the success of the project.
This third edition of the successful Analysis and Design of Information Systems provides a comprehensive introduction and user-friendly survey to all aspects of business... |  |  Sams Teach Yourself Django in 24 HoursIn just 24 lessons of one hour or less, you will be able to build full-featured production websites using Django, the powerful web development framework based on Python.
Designed for experienced website developers who have at least some familiarity with the Python programming language,... |  |  Mainframe Basics for Security Professionals: Getting Started with RACFSecurity—it comes in many forms in the IT world: physical security around a data center, user ID authentication when a transaction gets executed, access control against a database, audit records for anomaly detection. All these forms can be bought and paid for, yet, one element must be taught. That is, the human, the person who administers... |
|
 Oracle Essentials: Oracle Database 11gOracle is an enormous system, with myriad technologies, options, and releases. Most users-even experienced developers and database administrators-find it difficult to get a handle on the full scope of the Oracle database. And, as each new Oracle version is released, users find themselves under increasing pressure to learn about a whole range of new... |  |  Network Security Assessment: Know Your NetworkHow secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this... |  |  Database and XML Technologies: First International XML Database Symposium, XSYM 2003, Berlin, Germany, September 8, 2003, ProceedingsThis book constitutes the refereed proceedings of the First International XML Database Symposium, XSym 2003, held in Berlin, Germany in September 2003.
The 18 revised full papers presented were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on XML-relational database management systems, XML... |
|
|
| Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 |