Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Next Wave in Computing, Optimization, and Decision Technologies
The Next Wave in Computing, Optimization, and Decision Technologies
Brown et al. (2004) (see also Reed 1994 and Skroch 2004) model the
completion of an adversarial nation’s nuclear-weapons program using
general techniques of PERT. (See PERT 1958 and Malcolm et al. 1959
for the original descriptions of PERT, and see Moder et al. 1983 for a
comprehensive review.) Brown et al. (2004) ask the
...
C# Game Programming Cookbook for Unity 3D
C# Game Programming Cookbook for Unity 3D

This second edition of C# Game Programming Cookbook for Unity 3D expounds upon the first with more details and techniques. With a fresh array of chapters, updated C# code and examples, Jeff W. Murray’s book will help the reader understand structured game development in Unity unlike ever before.

New to this...

Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
Iran and Nuclear Weapons: Protracted Conflict and Proliferation (Routledge Global Security Studies)
Iran and Nuclear Weapons: Protracted Conflict and Proliferation (Routledge Global Security Studies)

This book investigates what is driving Iran's nuclear weapons programme in a less-hostile regional environment, using a theory of protracted conflicts to explicate proliferation.

Iran’s nuclear weapons program has alarmed the international community since the 1990s, but has come to the forefront of international security...

An Inconvenient Death: How the Establishment Covered Up the David Kelly Affair
An Inconvenient Death: How the Establishment Covered Up the David Kelly Affair

The death of Dr David Kelly in 2003 is one of the the strangest events in the 21st century. This scrupulous scientist, an expert on weapons of mass destruction, was caught up in the rush to war in Iraq and in the pressure of those around Tony Blair to provide evidence that Saddam Hussein was producing chemical weapons. Kelly seemed...

Introduction to Electronic Defense Systems, Second Edition (Artech House Radar Library)
Introduction to Electronic Defense Systems, Second Edition (Artech House Radar Library)
In my government position I am responsible for military research and technology for the Italian armed forces. During my coordination work with the Western European Armament Group: Panel I1 (Research and Technology), discussions have often been of a highly technical nature. It is certainly easier to make management decisions with an adequate...
Protecting SQL Server Data
Protecting SQL Server Data

For as long as there has been something to communicate between two persons there has been data. Today, vast volumes of it are gathered about almost every individual and business. It is the information that we provide when we sign up for an account at our favorite website, fill out a job application, or apply for a mortgage.

These...

Success in Programming: How to Gain Recognition, Power, and Influence Through Personal Branding
Success in Programming: How to Gain Recognition, Power, and Influence Through Personal Branding

Why should you, a competent software developer or programmer, care about your own brand? After all, it’s not like you're an actor or musician.

In fact, as Success in Programming: How to Gain Recognition, Power, and Influence Through Personal Branding demonstrates in...

The Lucent Library of Science and Technology - Artificial Intelligence
The Lucent Library of Science and Technology - Artificial Intelligence
As far back as the ancient Greek civilization, people have imagined machines and mechanical men that could work and think like any human. One Greek myth, for example, tells of the Greek god Hephaestus, who built mechanical men to forge powerful weapons and spectacular jewelry. When the king of Crete requested that he make a giant man to guard his...
Build iOS Games with Sprite Kit: Unleash Your Imagination in Two Dimensions
Build iOS Games with Sprite Kit: Unleash Your Imagination in Two Dimensions

For beginning iOS developers who want to write games and interactive applications.

Take your game ideas from paper to pixels using Sprite Kit, Apple's 2D game development engine. Build two exciting games using Sprite Kit and learn real-world, workshop-tested insights about game design, including cognitive
...

Crimeware: Understanding New Attacks and Defenses (Symantec Press)
Crimeware: Understanding New Attacks and Defenses (Symantec Press)
“This book is the most current and comprehensive analysis of the state of Internet security threats right now. The review of current issues and predictions about problems years away are critical for truly understanding crimeware. Every concerned person should have a copy and use it for reference.”
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
The mightiest fortresses in the world can fail, and when that happens all you can do (you being the person responsible for castle security) is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer...
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy