|
|
|
|
iPhone 3D Game Programming All In One
This is a complete guide to iPhone and iPod Touch game development. Beginning with the basics and ending with a finished game published in the App store this book covers all the fundamentals. The combined strength of Unity and the iPhone development platform are used to full effect allowing even complete novices to create and publish an... | | OpenCart 1.4 Template Design Cookbook
Templates in OpenCart provide a powerful way to make your site look exactly the way you want either using a single template for the entire site or a separate template for each site section. Although it sounds like an easy task to build and maintain templates, it can be challenging
to get beyond the basics and customize templates to... | | Never Threaten to Eat Your Co-Workers: Best of Blogs
Do you occasionally wonder,
-
What kind of person works at a porn video store?
-
Do public defenders believe in their clients?
-
What does a reporter feel when he visits war-torn Iraq?
-
What happens after a child star falls into obscurity?
Thanks to Web logs, or... |
|
Molecular Logic-based Computation: RSC (Monographs in Supramolecular Chemistry)
We all learn - in schools, factories, bars and streets. We gather, store, process and transmit information in society. Molecular systems involved in our senses and within our brains allow all this to happen and molecular systems allow living things of all kinds to handle information for the purpose of survival and growth. Nevertheless, the... | | Breast Cancer Research Protocols (Methods in Molecular Medicine)
A collection of both well-established and cutting-edge methods for investigating breast cancer biology not only in the laboratory, but also in clinical settings. These readily reproducible techniques solve a variety of problems, ranging from how to collect, store, and prepare human breast tumor samples for analysis, to analyzing cells in vivo... | | Security Assessment: Case Studies for Implementing the NSA IAMThe National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or... |
|
|
iOS SDK Programming A Beginners Guide
Response to the iPhone, the iPod touch, and now the iPad has been nothing short of overwhelming. The App Store has captured the hobbyist’s imagination like no other platform in recent memory. Hobbyists have made—and will continue to make—money from their creations sold on the App Store. And we aren’t necessarily... | | XForms EssentialsXForms Essentials is an introduction and practical guide to the new XForms specification. Written by Micah Dubinko, a member of the W3C XForms working group and an editor of the specification, the book explains the how and why of XForms, showing readers how to take advantage of them without having to write their... | | Handbook of Database Security: Applications and TrendsDatabase security has been gaining a great deal of importance as industry, military, and government organizations have increasingly adopted Internet-based technologies on a large-scale, because of convenience, ease of use, and the ability to take advantage of rapid advances in the commercial market. Along with the traditional security aspects of... |
|
|
Result Page: 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 |