Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Unity Multiplayer Games
Unity Multiplayer Games

Take your gaming development skills into the online multiplayer arena by harnessing the power of Unity 4 or 3. This is not a dry tutorial - it uses exciting examples and an enthusiastic approach to bring it all to life.

Overview

  • Create a variety of multiplayer games and apps in the Unity 4 game engine,...
Java 2 Platform, Enterprise Edition: Platform and Component Specifications
Java 2 Platform, Enterprise Edition: Platform and Component Specifications

The Java 2(TM) Platform, Enterprise Edition (J2EE) defines a new standard in enterprise solutions through a simplified, component-based development model. By extending the "write-once, run-anywhere(TM)" benefits of the Java programming language to enterprise servers, J2EE adds the scalability, robustness, and...

Logics in Artificial Intelligence: 9th European Conference, JELIA 2004, Lisbon, Portugal, September 27-30, 2004
Logics in Artificial Intelligence: 9th European Conference, JELIA 2004, Lisbon, Portugal, September 27-30, 2004
This book constitutes the refereed proceedings of the 9th European Conference on Logics in Artificial Intelligence, JELIA 2004, held in Lisbon, Portugal, in September 2004.

The 52 revised full papers and 15 revised systems presentation papers presented together with the abstracts of 3 invited talks were carefully reviewed and selected from a...

iOS Programming: The Big Nerd Ranch Guide (2nd Edition) (Big Nerd Ranch Guides)
iOS Programming: The Big Nerd Ranch Guide (2nd Edition) (Big Nerd Ranch Guides)

In this book, the world's leading Apple platform development trainers offer a complete, practical, hands-on introduction to iPhone and iPad programming. The authors walk through all the Apple tools and technologies needed to build successful iPhone/iPad/iPod touch apps, including the iOS 4.3 SDK, the Objective-C language, Xcode 4,...

Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this...

ZeroMQ: Messaging for Many Applications
ZeroMQ: Messaging for Many Applications
Dive into ØMq (aka ZeroMq), the smart socket library that gives you fast, easy, message-based concurrency for your applications. With this quick-paced guide, you’ll learn hands-on how to use this scalable, lightweight, and highly flexible networking tool for exchanging messages among clusters, the cloud, and other multi-system...
The Evolution of Violence (Evolutionary Psychology)
The Evolution of Violence (Evolutionary Psychology)

This volume is an interdisciplinary exploration of our understanding of the causes and consequences of violence. Represented in its chapters are noted scholars from a variety of fields including psychology, anthropology, law, and literature. The contributions reflect a broad scope of inquiry and diverse levels of analysis. With an underlying...

Introducing Gradle
Introducing Gradle

This concise book is a quick start-up primer on the Gradle build and release tool. You'll learn about Gradle and how to set it up to use. You'll learn about the Gradle life cycle and how to effectively leverage and use it. Also, you'll learn the basics of using site plugins and generating Javadocs, test coverage/FindBugs reports,...

Multistate Systems Reliability Theory with Applications
Multistate Systems Reliability Theory with Applications

Most books in reliability theory are dealing with a description of component and system states as binary: functioning or failed. However, many systems are composed of multi-state components with different performance levels and several failure modes. There is a great need in a series of applications to have a more refined description of these...

Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat...

Patterns of Enterprise Application Architecture
Patterns of Enterprise Application Architecture

The practice of enterprise application development has benefited from the emergence of many new enabling technologies. Multi-tiered object-oriented platforms, such as Java and .NET, have become commonplace. These new tools and technologies are capable of building powerful applications, but they are not easily implemented....

Developing IP Multicast Networks: The Definitive Guide to Designing and Deploying CISCO IP Multi- cast Networks
Developing IP Multicast Networks: The Definitive Guide to Designing and Deploying CISCO IP Multi- cast Networks

The definitive guide to designing and deploying Cisco IP multicast networks

  • Clear explanations of the concepts and underlying mechanisms of IP multicasting, from the fundamentals to advanced design techniques
  • Concepts and techniques are reinforced through real-world network examples, each clearly illustrated in a...
unlimited object storage image
Result Page: 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy