Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Effective Digital Learning: Transforming Traditional Learning Models to a Virtual World
Effective Digital Learning: Transforming Traditional Learning Models to a Virtual World

Traditional learning as we know it has evolved. Gone are the days when students need to travel to a physical location to learn. With the increase of mobile devices and broadband Internet services, learning can take place anywhere at any time. Effective Digital Learning is here to help you make the paradigm shift with...

Beginning Game AI with Unity: Programming Artificial Intelligence with C#
Beginning Game AI with Unity: Programming Artificial Intelligence with C#
Among all the technologies that have been flourishing in the last decade, there is one that is becoming essential for our society and it’s enhancing all the other tech fields as well as every aspect of our life: Artificial Intelligence (AI). From navigation systems to smart cars and from virtual assistants to augmented...
Image Processing in C
Image Processing in C
This book is a tutorial on image processing. Each chapter explains basic concepts with words and figures, shows image processing results with pho- tographs, and implements the operations in C. Information herein comes from articles published in The C/C++ Users Journal from 1990 through 1998 and from the first edition of this book...
How to Build Android Apps with Kotlin: A hands-on guide to developing, testing, and publishing your first apps with Android
How to Build Android Apps with Kotlin: A hands-on guide to developing, testing, and publishing your first apps with Android

Master the fundamentals of Android programming and apply your skills to create scalable and reliable apps using industry best practices

Key Features

  • Build apps with Kotlin, Google's preferred programming language for Android development
  • Unlock solutions to development...
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks

Master malware analysis to protect your systems from getting infected

Key Features

  • Set up and model solutions, investigate malware, and prevent it from recurring
  • Learn core concepts relating to dynamic malware analysis, memory forensics, decryption, and much more
  • ...
Practical Algorithms for 3D Computer Graphics, Second Edition
Practical Algorithms for 3D Computer Graphics, Second Edition

Practical Algorithms for 3D Computer Graphics, Second Edition covers the fundamental algorithms that are the core of all 3D computer graphics software packages. Using Core OpenGL and OpenGL ES, the book enables you to create a complete suite of programs for 3D computer animation, modeling, and image synthesis.

...
VMware vSphere PowerCLI Reference: Automating vSphere Administration
VMware vSphere PowerCLI Reference: Automating vSphere Administration

The book is, of course, primarily targeted at administrators of vSphere environments who want to automate tasks. But the subjects that we discuss in the book cover so many aspects of the management of a VMware vSphere environment that everyone who comes into contact with a VMware vSphere environment will be able to pick up something...

Building Python Real-Time Applications with Storm
Building Python Real-Time Applications with Storm

Learn to process massive real-time data streams using Storm and Python―no Java required!

About This Book

  • Learn to use Apache Storm and the Python Petrel library to build distributed applications that process large streams of data
  • Explore sample applications in real-time and analyze...
The Impossible Turned Possible: How to Turn Your Dreams into Reality
The Impossible Turned Possible: How to Turn Your Dreams into Reality
In The Impossible Turned Possible, Carolyn Chism Hardy provides a roadmap to plan one’s journey to the life they deserve with a simple 5 step process.

The Impossible Turned Possible is a step-by-step guide acting as a virtual assistant to help every step of the way. The real-life experiences discussed...

Programming MapPoint in .NET
Programming MapPoint in .NET

Interactive web maps generated by MapPoint-Microsoft's popular mapping technology are crucial for businesses in a number of fields, including real estate, package delivery, and commercial air travel. In a word, MapPoint provides businesses with "location." Specifically, it provides an integrated set of products,...

Security Sage's Guide to Hardening the Network Infrastructure
Security Sage's Guide to Hardening the Network Infrastructure
With the proliferation of wireless access points (WAPs), virtual private networks
(VPNs), and extranets, it’s becoming increasingly difficult to determine where
your network begins and ends. Add this complexity to common economic factors,
such as company mergers and acquisitions, and now you have a tangled web
of
...
Spark for Python Developers
Spark for Python Developers

Key Features

  • Set up real-time streaming and batch data intensive infrastructure using Spark and Python
  • Deliver insightful visualizations in a web app using Spark (PySpark)
  • Inject live data using Spark Streaming with real-time events

Book Description

Looking...

unlimited object storage image
Result Page: 104 103 102 101 100 99 98 97 96 95 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy