Home | Amazing | Today | Tags | Publishers | Years | Search 
Learn cocos2d Game Development with iOS 5 (Learn Apress)
Learn cocos2d Game Development with iOS 5 (Learn Apress)

Did you ever imagine yourself writing a computer game and being able to make money selling it? With Apple’s iTunes App Store and the accompanying mobile devices iPhone, iPod touch, and iPad, it’s now easier than ever. Of course, that doesn’t mean it’s easy— there’s still a lot to learn about game...

Effectiveness of Air Force Science and Technology Program Changes
Effectiveness of Air Force Science and Technology Program Changes

Under mandate of Section 253, Study and Report on Effectiveness of Air Force Science and Technology Program Changes, of the Fiscal Year 2002 National Defense Authorization Act (Public Law 107-107; U.S. Congress, 2001), the U.S. Air Force contracted with the National Research Council (NRC) to conduct the present study. In response,...

Advances in Swarm Intelligence: First International Conference, ICSI 2010, Beijing
Advances in Swarm Intelligence: First International Conference, ICSI 2010, Beijing

This book and its companion volume, LNCS vols. 6145 and 6146, constitute the proceedings of the International Conference on Swarm Intelligence (ICSI 2010) held in Beijing, the capital of China, during June 12-15, 2010. ICSI 2010 was the first gathering in the world for researchers working on all aspects of swarm intelligence, and...

Digital Asset Management
Digital Asset Management

My interest in this subject started when I joined the broadcast equipment manufacturer, Chyron. For a few years I was the product manager for their playout automation and asset management product lines. These were one of the first applications that gave television broadcasters the means to manage the ingest, storage, archiving, and...

Beginning ASP.NET Web Pages with WebMatrix
Beginning ASP.NET Web Pages with WebMatrix

Back in 1997, when I began my career as a professional web developer, I started working with Classic ASP. After a brief training period in a few different programming languages such as C++ and Java, I was thrown in at the deep end and assigned to a project to build an Intranet application for a large consultancy firm in the Netherlands...

Mining Complex Data (Studies in Computational Intelligence)
Mining Complex Data (Studies in Computational Intelligence)

Data mining and knowledge discovery can today be considered as stable fields with numerous efficient methods and studies that have been proposed to extract knowledge from data. Nevertheless, the famous golden nugget is still challenging. Actually, the context evolved since the first definition of the KDD process and knowledge has now...

Programming Entity Framework: DbContext
Programming Entity Framework: DbContext

Microsoft’s principal data access technology, ADO.NET Entity Framework, has had two major releases as part of the .NET Framework. .NET 3.5 brought us the first version of Entity Framework, which is covered in the first edition of Programming Entity Framework (O’Reilly). In 2010, Microsoft .NET 4 was released, containing the...

Pro jQuery
Pro jQuery

At its heart, jQuery does something that sounds pretty dull: it lets you modify the contents of HTML documents by manipulating the model that the browser creates when it processes the HTML (known as DOM manipulation, as I’ll explain later). If you are reading this, you have probably already done some DOM manipulation, either using...

iPhone Location Aware Apps by Example: Beginners Guide
iPhone Location Aware Apps by Example: Beginners Guide
iPhone Location Aware Apps Beginner's Guide is probably the first book from any technical publisher that teaches you to build real world applications (five of them). That's a bold step from PacktPub - by undertaking more lively practical examples, rather than 400 pages of text! The book lays emphasis on location services, due to the...
Contemporary Cryptology (Advanced Courses in Mathematics - CRM Barcelona)
Contemporary Cryptology (Advanced Courses in Mathematics - CRM Barcelona)
In February 2004, at the Universitat Polit`ecnica de Catalunya, we presented a 45-hour Advanced Course on Contemporary Cryptology, organised by the Centre de Recerca Matem`atica. This volume is an expanded and unified version of the material presented in the lectures and the background material that we distributed among the...
The Adobe Photoshop Layers Book
The Adobe Photoshop Layers Book
Any time you try to develop a skill, you want to make sure that you take advantage of the basic tools of the trade. If you were a bus driver, you would want to be sure you knew how to use the key, gas pedal, brake pedal, clutch, shift-stick, turn signals, and steering wheel, and where the gas goes to be sure you were going to...
RF and Microwave Circuits, Measurements, and Modeling (The RF and Microwave Handbook, Second Edition)
RF and Microwave Circuits, Measurements, and Modeling (The RF and Microwave Handbook, Second Edition)

The first edition of the RF and Microwave Handbook was published in 2000. The project got off to an inauspicious start when 24 inches of snow fell in Denver the evening before the advisory board planned to hold their kick-off meeting. Two members of the board were trapped for days in the Denver airport since planes were not arriving or...

Result Page: 486 485 484 483 482 481 480 479 478 477 476 475 474 473 472 471 470 469 468 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy