Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Real-World Flash Game Development: How to Follow Best Practices AND Keep Your Sanity
Real-World Flash Game Development: How to Follow Best Practices AND Keep Your Sanity

This book covers Flash for the everyday developer. The average Flash developer doesn't have luxurious timelines, employers who understand the value of reusability, or the help of an information architect to design a usable experience. This book helps bridge the gap for these coders who may be used to C++, Java, or C# and want to move over...

DRAWING PROGRAMS: The Theory and Practice of Schematic Functional Programming
DRAWING PROGRAMS: The Theory and Practice of Schematic Functional Programming

A practical guide for learning functional programming directly through the diagrams used to define functions, this book describes, and provides access to, a system that gives a level of support akin to that provided in word processing. The approach used allows the schematic diagrams used in program design to be directly translated into usable...

Parallel Computing: Architectures, Algorithms and Applications - Volume 15 Advances in Parallel Computing
Parallel Computing: Architectures, Algorithms and Applications - Volume 15 Advances in Parallel Computing

ParCo2007 marks a quarter of a century of the international conferences on parallel computing that started in Berlin in 1983. The aim of the conference is to give an overview of the state-of-the-art of the developments, applications and future trends in high performance computing for all platforms. The conference addresses all aspects of...

Cyber Risks for Business Professionals: A Management Guide
Cyber Risks for Business Professionals: A Management Guide

The benefits which Internet technologies offer to business professionals also present considerable risks. The management of these risks is the focus of this book.

Realize the benefits of Internet technologies, while ensuring your company is protected from the associated risks!

An effective risk management...

Systems Biology for Traditional Chinese Medicine
Systems Biology for Traditional Chinese Medicine

The application of systems biology methods to Traditional Chinese Medicine

Emphasizing the harmony of the human body with the environment, Traditional Chinese Medicine (TCM) has evolved over thousands of years. It is a systemic theory derived from clinical experience, the philosophy of holism and systematology, and the...

iOS Development with Xamarin Cookbook - More than 100 Recipes, Solutions, and Strategies for Simpler iOS Development
iOS Development with Xamarin Cookbook - More than 100 Recipes, Solutions, and Strategies for Simpler iOS Development

Key Features

  • Explore the new features of Xamarin and learn how to use them
  • Step-by-step recipes give you everything you need to get developing with Xamarin
  • Full of useful tips and best practices on creating iOS applications

Book Description

This book will...

Improvement Measures of Urban Thermal Environment (SpringerBriefs in Applied Sciences and Technology)
Improvement Measures of Urban Thermal Environment (SpringerBriefs in Applied Sciences and Technology)

Maximizing readers’ insights into urban and architectural environmental planning with consideration for the thermal environment, this work highlights how various urban heat-island strategies have been developed and their effectiveness in urban areas. Specific measures to combat the urban heat-island phenomenon, including improvement of...

The Ugly Truth about Small Business: 50 (Never-Saw-It-Coming) Things That Can Go Wrong...and What You Can Do about It
The Ugly Truth about Small Business: 50 (Never-Saw-It-Coming) Things That Can Go Wrong...and What You Can Do about It

You Are Not Alone

Being an entrepreneur is scary. From late payments to bank crisis, often the future of your business rides on one crucial decision--one you have to make all on your own.
But it doesn't have to be that way. Others have faced the same problems, and for the first time have gathered to share their
...

Hands-On Neural Networks with Keras: Design and create neural networks using deep learning and artificial intelligence principles
Hands-On Neural Networks with Keras: Design and create neural networks using deep learning and artificial intelligence principles

Your one-stop guide to learning and implementing artificial neural networks with Keras effectively

Key Features

  • Design and create neural network architectures on different domains using Keras
  • Integrate neural network models in your applications using this highly practical...
Real World Microsoft Access Database Protection and Security
Real World Microsoft Access Database Protection and Security

Microsoft Access is the most popular desktop database in the world today and its very popularity means that its security measures can be easily compromised. Real World Microsoft Access Database Security takes a different approach to all the other Access books in the market in that it focuses from the start on all the issues that...

Hack I.T.: Security Through Penetration Testing
Hack I.T.: Security Through Penetration Testing
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
Advanced .NET Remoting, Second Edition
Advanced .NET Remoting, Second Edition

With the arrival of .NET remoting, any programmer who wants to work with distributed objects can benefit from Advanced .NET Remoting, a solid tour of basic and expert techniques for working with distributed code on Microsoft's newest platform.

This title's concise, code-centered approach, backed up by judicious...

unlimited object storage image
Result Page: 184 183 182 181 180 179 178 177 176 175 174 173 172 171 170 169 168 167 166 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy