Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Unity 3D Game Development by Example Beginner's Guide
Unity 3D Game Development by Example Beginner's Guide

The book takes a clear, step-by-step approach to building small, simple game projects. It focuses on short, attainable goals so that the reader can finish something, instead of trying to create a complex RPG or open-world game that never sees the light of day. This book encourages readers hungry for knowledge. It does not go into gory detail...

Foundation Flash CS3 Video
Foundation Flash CS3 Video

Video is one of the most exciting features on today's Internet, with widespread adoption being made possible by advances in bandwidth and software. But simply streaming video clips to Web users is only the tip of the iceberg! Flash CS3 offers a whole host of advanced video features, allowing you to create breathtaking user...

Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking
Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking
"Disappearing Cryptography is a witty and entertaining look at the world of information hiding. Peter Wayner provides an intuitive perspective of the many techniques, applications, and research directions in the area of steganography. The sheer breadth of topics is outstanding and makes this book truly unique. A must read for...
Understanding IBM SOA Foundation Suite: Learning Visually with Examples
Understanding IBM SOA Foundation Suite: Learning Visually with Examples

The IBM SOA Foundation Suite is an integrated, open-standards-based set of software, best practices, and patterns that help you systematically maximize the business value of SOA. Understanding IBM SOA Foundation Suite brings together 26 hands-on tutorials that will help you master IBM SOA Foundation and apply it successfully...

An Introduction to Quantum Computing
An Introduction to Quantum Computing
This concise, accessible text provides a thorough introduction to quantum computing - an exciting emergent field at the interface of the computer, engineering, mathematical and physical sciences. Aimed at advanced undergraduate and beginning graduate students in these disciplines, the text is technically detailed and is clearly illustrated...
Linux Recipes for Oracle DBAs (Recipes: a Problem-Solution Approach)
Linux Recipes for Oracle DBAs (Recipes: a Problem-Solution Approach)

Linux Recipes for Oracle DBAs is an example–based book on managing Oracle Database in a Linux environment. Covering commonly used distributions such as Red Hat Enterprise Linux and Oracle Enterprise Linux, the book is written for database administrators who need to get work done and lack the luxury of curling up fireside with a...

The Compromise of Liberal Environmentalism
The Compromise of Liberal Environmentalism
Mark W. Zacher, University of British Columbia
Clearly one of the best studies on international environmental politics.

"Bernstein convincingly and usefully rejects the role of epistemic communities as a driving force behind the norm change he identifies... Compelling... His attention to the role of ideas...

Designing BSD Rootkits: An Introduction to Kernel Hacking
Designing BSD Rootkits: An Introduction to Kernel Hacking
Designing BSD Rootkits introduces the fundamentals of programming and developing rootkits under the FreeBSD operating system. In addition to explaining rootkits and rootkit writing, the book aims to inspire readers to explore the FreeBSD kernel and gain a better understanding of the kernel and the FreeBSD operating system itself. Unlike...
Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science)
Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science)

Concepts like ubiquitous computing and ambient intelligence that exploit increasingly interconnected networks and mobility put new requirements on data management. An important element in the connected world is that data will be accessible anytime anywhere. This also has its downside in that it becomes easier to get unauthorized data...

Stroke Prevention
Stroke Prevention
The treatment of stroke remains ineffective, and prevention is the key issue for this common disease. Norris and Hachinski have recruited an international group of experts to provide a comprehensive, critical review of the evidence on the primary and secondary prevention of cerebrovascular disease and to translate this information into clinical...
Nokia Firewall, VPN, and IPSO Configuration Guide
Nokia Firewall, VPN, and IPSO Configuration Guide
The Only Book and Companion Web Site Covering Nokia's Firewall/VPN Appliances, which is the #3 security appliance worldwide.

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its
...
Inventing the PC: The MCM/70 Story
Inventing the PC: The MCM/70 Story

In May 1973, Micro Computer Machines, a Toronto-based electronics company, gave a public demonstration of a small computer called the MCM/70. Powered by a microprocessor and operated with APL, a sophisticated programming language, the MCM/70 was positioned to be a practical, affordable, and easy-to-use personal computer - the very first of...

Result Page: 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy