Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Creating eLearning Games with Unity
Creating eLearning Games with Unity

Develop your own 3D elearning game using gamification, systems design, and gameplay programming techniques About This Book Develop a game framework for a 3D eLearning game Program dynamic interactive actors and objects to populate your game world An easy-to-follow guide along with an extensive source code to support and guide readers through...

The Unified Process Inception Phase : Best Practices for Implementing the UP
The Unified Process Inception Phase : Best Practices for Implementing the UP
Is the Unified Process the be all and end all standard for developing object-oriented component-based software? This book is the third in a four volume series that presents a critical review of the Unified Process. The authors present a survey of the alte

Fill the gap between theory and practice! Implement a software process that goes
...
iPhone Open Application Development: Write Native Objective-C Applications for the iPhone
iPhone Open Application Development: Write Native Objective-C Applications for the iPhone
Certain technologies bring out everyone's hidden geek, and iPhone did the moment it was released. Even though Apple created iPhone as a closed device, tens of thousands of developers bought them with the expressed purpose of designing and running third-party software. In this clear and concise book, veteran hacker Jonathan Zdziarski -- one of the...
Video Segmentation and Its Applications
Video Segmentation and Its Applications

Video segmentation has been a key technique for visual information extraction and plays an important role in digital video processing, pattern recognition, and computer vision. A wide range of video-based applications will benefit from advances in video segmentation including security and surveillance, bank transactions monitoring,...

CCNP Security Secure 642-637 Official Cert Guide
CCNP Security Secure 642-637 Official Cert Guide

Trust the best selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.

 

...
iOS 5 Recipes: A Problem-Solution Approach (Recipes Apress)
iOS 5 Recipes: A Problem-Solution Approach (Recipes Apress)

iOS 5 Recipes: A Problem-Solution Approach is your guide to developing solutions on iPad, iPhone, and other iOS 5 devices and platforms. This book provides in-depth code samples and discussions for scenarios that developers face every day. You'll find numerous examples of real-world cases that will enable you to build...

One-Dimensional Nanostructures (Lecture Notes in Nanoscale Science and Technology)
One-Dimensional Nanostructures (Lecture Notes in Nanoscale Science and Technology)

One-dimensional (1D) nanostructures represent a group of nanomaterials with highly anisotropic morphologies, the smallest dimension falling in the range of 1–100 nm. Typical examples of 1D nanostructures include nanowires and nanotubes. Semiconductor nanowires are characterized by the efficient transport of electrons and excitons, and...

Randomized Algorithms for Analysis and Control of Uncertain Systems: With Applications (Communications and Control Engineering)
Randomized Algorithms for Analysis and Control of Uncertain Systems: With Applications (Communications and Control Engineering)

The presence of uncertainty in a system description has always been a critical issue in control. The main objective of Randomized Algorithms for Analysis and Control of Uncertain Systems, with Applications (Second Edition) is to introduce the reader to the fundamentals of probabilistic methods in the analysis and design of...

Applied Public Key Infrastructure (Frontiers in Artificial Intelligence and Applications)
Applied Public Key Infrastructure (Frontiers in Artificial Intelligence and Applications)
Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, in which many organizations are now leveraging it as part of their core infrastructure system for providing and building security in their businesses. Understanding the challenges and requirements of PKI related...
CISSP Training Kit
CISSP Training Kit

Your 2-in-1 Self-Paced Training Kit

EXAM PREP GUIDE

Ace your preparation for Certified Information Systems Security Professional (CISSP) Exam. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce what you’ve learned by applying
...

Uncertain Schema Matching (Synthesis Lectures on Data Management)
Uncertain Schema Matching (Synthesis Lectures on Data Management)
Schema matching is the task of providing correspondences between concepts describing the meaning of data in various heterogeneous, distributed data sources. Schema matching is one of the basic operations required by the process of data and schema integration, and thus has great effect on its outcomes. Schema matching research has...
Absolute Beginner's Guide to A+ Certification
Absolute Beginner's Guide to A+ Certification

Passing a test is one thing...mastering the field is another, and this book is the first step to mastering the world of PC hardware and operating systems. Mark Edward Soper not only shows you what you need to pass the tests, but also what you need to have an edge on the competition, on exam day and in the workplace. Each chapter...

unlimited object storage image
Result Page: 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy