Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Visual Basic Game Programming for Teens
Visual Basic Game Programming for Teens

Visual Basic Game Programming for Teens, Third Edition teaches teens and other beginners how to create their own 2D role-playing game (RPG) using the free to download and easy to use Visual Basic 2008 Express. The game is built step-by-step throughout the book as readers learn new skills and build upon them. This new edition features almost...

Microsoft Forefront UAG 2010 Administrator's Handbook
Microsoft Forefront UAG 2010 Administrator's Handbook

The Israeli department of defence has one of the strictest information security guidelines in the world, and a part of these guidelines is the requirement to have complete physical separation between the public and internal networks. A regular firewall just won't do, and this requirement gave birth to the concept of the Air-Gap, a...

GNSS Markets and Applications (GNSS Technology and Applications)
GNSS Markets and Applications (GNSS Technology and Applications)

After being shrouded in esoterica for a long time, Global Navigation Satellite Systems (GNSS) have become part of everyday life, especially the Global Positioning System (GPS). Having spent 40 years involved with the subject, it became clear to me that it would be useful to have a book about the business aspects of these systems. This...

Enterprise OSGi in Action: With examples using Apache Aries
Enterprise OSGi in Action: With examples using Apache Aries

Summary

Enterprise OSGI in Action is a hands-on guide for developers using OSGi to build the next generation of enterprise Java applications. By presenting relevant examples and case studies, this book guides the reader through the maze of new standards and projects.

About This Book

...
The Little Book of Trading: Trend Following Strategy for Big Winnings
The Little Book of Trading: Trend Following Strategy for Big Winnings

How to get past the crisis and make the market work for you again

The last decade has left people terrified of even the safest investment opportunities. This fear is not helping would-be investors who could be making money if they had a solid plan. The Little Book of Trading teaches the average person rules...

Advanced Technical Analysis of ETFs: Strategies and Market Psychology for Serious Traders
Advanced Technical Analysis of ETFs: Strategies and Market Psychology for Serious Traders

A comprehensive book filled with technical analysis tools and strategies for the advanced ETF trader

Advanced Technical Analysis of ETFs is an important resource for sophisticated ETF traders that contains a wealth of expanded strategies for technical trade setups and includes the author's best real trade examples...

Practical JSF in Java EE 8
Practical JSF in Java EE 8

Master the Java EE 8 and JSF (JavaServer Faces) APIs and web framework with this practical, projects-driven guide to web development. This book combines theoretical background with a practical approach by building four real-world applications. By developing these JSF web applications, you'll take a tour through the other...

Microsoft SQL Server 2005 Integration Services
Microsoft SQL Server 2005 Integration Services

All medium to large companies have to deal with data being stored in a number of databases, spreadsheets and proprietary applications. Bringing all this data together into one system can be useful to analyzing the business; but can also be quite difficult to do. Integration Services is the next...

MEMS Mechanical Sensors
MEMS Mechanical Sensors
    With this practical guide to design tools and packaging, professionals and academics can create the sensors they need for a complete range of next generation applications.

    Here's the book to keep handy when you have to overcome obstacles in design, simulation,
...
Network Security Assessment: From Vulnerability to Patch
Network Security Assessment: From Vulnerability to Patch
This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks.

This is unique in that it details both the management and technical skill and tools
...
Artificial Mind System: Kernel Memory Approach (Studies in Computational Intelligence)
Artificial Mind System: Kernel Memory Approach (Studies in Computational Intelligence)

This book is written from an engineer's perspective of the mind. "Artificial Mind System" exposes the reader to a broad spectrum of interesting areas in general brain science and mind-oriented studies. In this research monograph a picture of the holistic model of an artificial mind system and its behaviour is drawn, as concretely as...

.NET Windows Forms Custom Controls
.NET Windows Forms Custom Controls

The intent of this book is to teach .NET developers the skills necessary to create their own leading edge custom controls. The art of creating custom controls has never been truly explored in detail, often the examples provided are trivial and do not begin to explore the requirements need for a commercial quality custom control. This book will...

unlimited object storage image
Result Page: 246 245 244 243 242 241 240 239 238 237 236 235 234 233 232 231 230 229 228 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy