Home | Amazing | Today | Tags | Publishers | Years | Search 
Retro Game Programming: Unleashed for the Masses (Premier Press Game Development)
Retro Game Programming: Unleashed for the Masses (Premier Press Game Development)

Twenty-one years ago, I read a book that changed my life. Today I hope to write a book that will change yours. This is not a self-help book or some form of new philosophy. This book is the gateway to the inner sanctums of game programming, past and present. Bold words, I know, but I believe in this book with my whole heart. To someone...

Programming Like a Pro for Teens
Programming Like a Pro for Teens

Are you ready to learn how to program a computer? You'll do just that in this book. PROGRAMMING LIKE A PRO FOR TEENS is written in a friendly, unassuming voice that makes it possible for you to master the ideas and concepts that professionals use for programming every day. You learn algorithmic thinking and problem-solving in addition to...

Ambient Intelligence for Scientific Discovery: Foundations, Theories, and Systems
Ambient Intelligence for Scientific Discovery: Foundations, Theories, and Systems

For half a century, computer scientists have been working on systems for discovering lawful patterns in letters, numbers, words and images. The research has expanded into the computational study of the process of scientific discovery, producing such well-known AI programs as BACON and DENDRAL. However, autonomous discovery systems...

Computer Technology Encyclopedia
Computer Technology Encyclopedia

These days, any attempt to write a full-blown encyclopedia or dictionary of computer terminology would be an exercise in futility. New terms and buzzwords appear every day, and information technology fi elds overlap with so many other fi elds it can be hard to determine if a word is IT, telecommunications, or graphics arts, and so on....

Self-organising Software: From Natural to Artificial Adaptation (Natural Computing Series)
Self-organising Software: From Natural to Artificial Adaptation (Natural Computing Series)

Stable and dependable IT services and infrastructures are nowadays of paramount importance not only for modern enterprises but also for home users. However, as distributed information infrastructures continue to spread and grow, resulting in Internet-based, wireless and mobile systems, traditional solutions for managing and...

Managing Web Usage in the Workplace: A Social, Ethical, and Legal Perspective
Managing Web Usage in the Workplace: A Social, Ethical, and Legal Perspective

The ubiquitous nature of the Internet is dramatically revolutionizing the manner in which organizations and individuals share information. Developed out of necessity during the cold war, the Internet was created as a means to help governmental institutions and collegiate institutions send documents and research materials electronically...

Testing IT: An Off-the-Shelf Software Testing Process
Testing IT: An Off-the-Shelf Software Testing Process

Why is astronomy considered a science while astrology is considered only a pseudoscience? In other words, how can we prove that a theory faithfully describes reality, and that this theory can then be used to predict unknown facts? Karl Popper, the well-known philosopher, studied these problems and summarized his conclusions in one...

Data Analysis with Open Source Tools
Data Analysis with Open Source Tools

THIS BOOK GREW OUT OFMY EXPERIENCE OF WORKING WITH DATA FOR VARIOUS COMPANIES IN THE TECH industry. It is a collection of those concepts and techniques that I have found to be the most useful, including many topics that I wish I had known earlier—but didn’t.

My degree is in physics, but I also worked as a software...

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition

The world of hacking is a world of pain and frustration. Frustration for the hacker as he tries to figure out how to break the latest and greatest security device, and pain for the manufacturer or corporation that made or was relying on that device.

Dissecting the Hack is one heck of a ride! Hackers, IT professional, and...

From Gutenberg to Google: Electronic Representations of Literary Texts
From Gutenberg to Google: Electronic Representations of Literary Texts

Although this book focuses on the problems and potentials for electronic representations of the fundamental materials of document-based knowledge in literature, similar conditions obtain for representations of works in music, philosophy, history, the law, and religion. These fields find in paper documents the primary materials of...

From Bash to Z Shell: Conquering the Command Line
From Bash to Z Shell: Conquering the Command Line

A shell is a sophisticated way to control your computer—Unix, Linux, Microsoft Windows, Mac OS X, and others. If you do more than the most basic operations, you can do many of them more powerfully and quickly with a shell and your keyboard than by using a mouse.

The history of shells goes back some 30 years. In the early...

Learning SPARQL
Learning SPARQL

More and more people are using the query language SPARQL (pronounced “sparkle”) to pull data from a growing collection of public and private data. Whether this data is part of a semantic web project or an integration of two inventory databases on different platforms behind the same firewall, SPARQL is making it easier to access...

Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy