Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Nuclear Energy: Principles, Practices, and Prospects
Nuclear Energy: Principles, Practices, and Prospects
"The material presented here is largely accessible to anyone interested in nuclear energy. This book is the best of its kind in providing a well-written survey of the science, technology, safety, and economics of the full range of nuclear issues, including power, waste, weapons, terrorism, biological effects, and the future of the nuclear...
Building an RPG with Unity 2018: Leverage the power of Unity 2018 to build elements of an RPG., 2nd Edition
Building an RPG with Unity 2018: Leverage the power of Unity 2018 to build elements of an RPG., 2nd Edition

Build a high-end, multiplayer role-playing game (RPG) from scratch with C# and Unity 2018

Key Features

  • Get insights into Unity's user interface (UI) system and and build UIs for your RPG
  • Implement artificial intelligence (AI) to build intelligent entities that take...
Blender 3D 2.49 Incredible Machines
Blender 3D 2.49 Incredible Machines
Blender 3D provides all the features you need to create super-realistic 3D models of machines for use in artwork, movies, and computer games. Blender 3D 2.49 Incredible Machines gives you step-by-step instructions for building weapons, vehicles, robots, and more.

This book will show you how to use Blender 3D for mechanical modeling and
...
Electronic Gadgets for the Evil Genius : 28 Build-It-Yourself
Electronic Gadgets for the Evil Genius : 28 Build-It-Yourself
The do-it-yourself hobbyist market, particularly in the area of electronics, is hotter than ever. This books gives the “evil genius” loads of projects to delve into, from an ultrasonic microphone, to a body heat detector, and all the way to a Star Wars Light Saber. This book makes creating these devices fun, inexpensive, and easy....
The Next Wave in Computing, Optimization, and Decision Technologies
The Next Wave in Computing, Optimization, and Decision Technologies
Brown et al. (2004) (see also Reed 1994 and Skroch 2004) model the
completion of an adversarial nation’s nuclear-weapons program using
general techniques of PERT. (See PERT 1958 and Malcolm et al. 1959
for the original descriptions of PERT, and see Moder et al. 1983 for a
comprehensive review.) Brown et al. (2004) ask the
...
Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
Iran and Nuclear Weapons: Protracted Conflict and Proliferation (Routledge Global Security Studies)
Iran and Nuclear Weapons: Protracted Conflict and Proliferation (Routledge Global Security Studies)

This book investigates what is driving Iran's nuclear weapons programme in a less-hostile regional environment, using a theory of protracted conflicts to explicate proliferation.

Iran’s nuclear weapons program has alarmed the international community since the 1990s, but has come to the forefront of international security...

Introduction to Electronic Defense Systems, Second Edition (Artech House Radar Library)
Introduction to Electronic Defense Systems, Second Edition (Artech House Radar Library)
In my government position I am responsible for military research and technology for the Italian armed forces. During my coordination work with the Western European Armament Group: Panel I1 (Research and Technology), discussions have often been of a highly technical nature. It is certainly easier to make management decisions with an adequate...
Protecting SQL Server Data
Protecting SQL Server Data

For as long as there has been something to communicate between two persons there has been data. Today, vast volumes of it are gathered about almost every individual and business. It is the information that we provide when we sign up for an account at our favorite website, fill out a job application, or apply for a mortgage.

These...

Success in Programming: How to Gain Recognition, Power, and Influence Through Personal Branding
Success in Programming: How to Gain Recognition, Power, and Influence Through Personal Branding

Why should you, a competent software developer or programmer, care about your own brand? After all, it’s not like you're an actor or musician.

In fact, as Success in Programming: How to Gain Recognition, Power, and Influence Through Personal Branding demonstrates in...

The Lucent Library of Science and Technology - Artificial Intelligence
The Lucent Library of Science and Technology - Artificial Intelligence
As far back as the ancient Greek civilization, people have imagined machines and mechanical men that could work and think like any human. One Greek myth, for example, tells of the Greek god Hephaestus, who built mechanical men to forge powerful weapons and spectacular jewelry. When the king of Crete requested that he make a giant man to guard his...
Build iOS Games with Sprite Kit: Unleash Your Imagination in Two Dimensions
Build iOS Games with Sprite Kit: Unleash Your Imagination in Two Dimensions

For beginning iOS developers who want to write games and interactive applications.

Take your game ideas from paper to pixels using Sprite Kit, Apple's 2D game development engine. Build two exciting games using Sprite Kit and learn real-world, workshop-tested insights about game design, including cognitive
...

Result Page: 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy