Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Unity Multiplayer Games
Unity Multiplayer Games

Take your gaming development skills into the online multiplayer arena by harnessing the power of Unity 4 or 3. This is not a dry tutorial - it uses exciting examples and an enthusiastic approach to bring it all to life.

Overview

  • Create a variety of multiplayer games and apps in the Unity 4 game engine,...
Food Webs and Biodiversity: Foundations, Models, Data
Food Webs and Biodiversity: Foundations, Models, Data

Food webs have now been addressed in empirical and theoretical research for more than 50 years. Yet, even elementary foundational issues are still hotly debated. One difficulty is that a multitude of processes need to be taken into account to understand the patterns found empirically in the structure of food webs and communities.

...

Beginning Ada Programming: From Novice to Professional
Beginning Ada Programming: From Novice to Professional

Discover the Ada programming language by being gently guided through the various parts of the language and its latest available stable release. The goal in this book is to slowly ease you into the different topics. It is understood that you do not always have ample free time, so the text is easy to digest and concepts are spoon fed...

Jeff Duntemann's Drive-By Wi-Fi Guide
Jeff Duntemann's Drive-By Wi-Fi Guide
Everything you need to know to design, build, protect, and extend a Wi-Fi wireless network!

You don’t have to knock holes in your walls to network your computers and share your family’s Internet connection. Wi-Fi connects computers, printers, video cameras and game consoles into a fast Ethernet network via microwaves. In this...

Wireless Communications Systems and Networks
Wireless Communications Systems and Networks
Wireless Communications Systems and Networks covers the breadth of research in wireless communications. It begins by detailing the essential background, such as wireless standards, spread spectrum and CDMA systems, and goes on to discuss advanced topics in next generation wireless systems. Discussions of advanced-level materials progress in a...
How to Cheat at Securing a Wireless Network
How to Cheat at Securing a Wireless Network
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. Some of the primary threats are the result of the following factors:
  • Denial of service (DoS) and other network layer attacks
  • Unauthorized...
Practical Data Communications
Practical Data Communications
With the accelerating growth in the use of computers and PCs in the workplace, the practical aspects of designing and operating data communications systems have become increasingly more complex. Practical Data Communications provides the needed background and fills in the gaps for the many who must tackle this vital technology with little basic...
Data Communications and Computer Networks: For Computer Scientists and Engineers
Data Communications and Computer Networks: For Computer Scientists and Engineers
A broad introductory text written for computer scientists and engineers, focusing on the fundamental aspects of data communications and computer networks. This second edition has been thoroughly revised to cover current networking issues and technologies. Specific updates include those on networks and their management, transmission technologies,...
Emerging Free and Open Source Software Practices
Emerging Free and Open Source Software Practices
Project infrastructure and software repositories are now widely available at low cost with easy extraction, providing a foundational base to conduct detailed cyber-archeology at a scale not open to researchers before. Emerging Free and Open Source Software Practices provides a collection of empirical research acting as a focal point to the status...
Mobile Broadcasting with WiMAX: Principles, Technology, and Applications
Mobile Broadcasting with WiMAX: Principles, Technology, and Applications
This book is exclusively dedicated to WiMAX. The focus of the book is on the applications of WiMAX networks, with delivery of multimedia content to wireless and mobile devices being the area of greatest attention. WiMAX has crossed a number of major milestones in the recent past. These include setting standards, adopting...
CouchDB and PHP Web Development Beginner’s Guide
CouchDB and PHP Web Development Beginner’s Guide

PHP and CouchDB Web Development will teach you the fundamentals of combining CouchDB and PHP to create a full application from conception to deployment. This book will direct you in developing a basic social network, while guiding you through some of the common pitfalls that are frequently associated with NoSQL databases.

CouchDB...

Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)
Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...

unlimited object storage image
Result Page: 233 232 231 230 229 228 227 226 225 224 223 222 221 220 219 218 217 216 215 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy