Home | Amazing | Today | Tags | Publishers | Years | Search 
Real-Time Interactive 3D Games: Creating 3D Games in Macromedia Director 8.5 Shockwave Studio
Real-Time Interactive 3D Games: Creating 3D Games in Macromedia Director 8.5 Shockwave Studio

This is a book about making 3D games in Macromedia Director Shockwave Studio. Expect it to be a book about code, interface tricks, and wacky game ideas. Along the way, I will share my experiences, life, and attitudes about games and game development. I have always tended to swim upstream, so I doubt that much of this will seem comfortable or...

Data Analysis Using SAS Enterprise Guide
Data Analysis Using SAS Enterprise Guide

The present book, Data Analysis Using SAS Enterprise Guide, provides readers with an overview of Enterprise Guide, the newest point-and-click interface from SAS. SAS Enterprise Guide is a graphical user (point-and-click) interface to the main SAS application, having relatively recently replaced the Analyst interface, which itself had replaced...

Verilog and SystemVerilog Gotchas: 101 Common Coding Errors and How to Avoid Them
Verilog and SystemVerilog Gotchas: 101 Common Coding Errors and How to Avoid Them

This book will help engineers write better Verilog/SystemVerilog design and verification code as well as deliver digital designs to market more quickly. It shows over 100 common coding mistakes that can be made with the Verilog and SystemVerilog languages. Each example explains in detail the symptoms of the error, the languages rules that...

The R Book
The R Book

R is a high-level language and an environment for data analysis and graphics. The design of R was heavily influenced by two existing languages: Becker, Chambers and Wilks’ S and Sussman’s Scheme. The resulting language is very similar in appearance to S, but the underlying implementation and semantics are derived from Scheme. This...

Embedded Software Development with eCos
Embedded Software Development with eCos

In 1997. there were over 100 commercially supported embedded operating systems, none of which had more than a minority share of the overall embedded OS market, not to mention countless thousands of others developed for specific projects (cell phones, radar arrays, networking equipment, etc.) that had no application developer base beyond that...

SamsTeachYourself TweetDeck
SamsTeachYourself TweetDeck

Do you like to tweet? Or follow other people’s tweets? Are you a heavy Facebook user? Do you like to follow your favorite entertainers on MySpace? Do you network with other business professionals on LinkedIn? If you engage in one or more of these activities, you know how time consuming the whole social networking thing can be. This is...

An Engineer's Guide to Automated Testing of High-Speed Interfaces
An Engineer's Guide to Automated Testing of High-Speed Interfaces

Providing a complete introduction to the state-of-the-art in high-speed digital testing with automated test equipment (ATE), this practical resource is the first book to focus exclusively on this increasingly important topic. Featuring clear examples, this one-stop reference covers all critical aspects of the subject, from high-speed digital...

XSLT Programmer's Reference 2nd Edition
XSLT Programmer's Reference 2nd Edition

This compact, relevant, updated version reflects recent changes in the XSLT specification and developments in XSLT parsers. The material on tools and implementations has been revised; so too have all the examples. It also includes a new chapter on writing extension functions.

XML has firmly established itself as the universal...

Grant Writing DeMYSTiFied
Grant Writing DeMYSTiFied

Create the perfect proposal to win funding for your ideas and plans

Need money for your charity or project but do not know the first thing about writing a grant? Let this DeMYSTiFied book unravel the secrets of this process. It will take you step-by-step through the fundamentals--from writing a letter of inquiry to outlining...

A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop...

The RSpec Book: Behaviour Driven Development with Rspec, Cucumber, and Friends (The Facets of Ruby Series)
The RSpec Book: Behaviour Driven Development with Rspec, Cucumber, and Friends (The Facets of Ruby Series)

You'll get started right away with RSpec 2 and Cucumber by developing a simple game, using Cucumber to express high-level requirements in language your customer understands, and RSpec to express more granular requirements that focus on the behavior of individual objects in the system. You'll learn how to use test doubles...

iOS Recipes: Tips and Tricks for Awesome iPhone and iPad Apps
iOS Recipes: Tips and Tricks for Awesome iPhone and iPad Apps

Our goal as programmers is to solve problems. Sometimes the problems are hard, sometimes they’re easy, and sometimes they’re even fun. Maybe they’re not even “problems” in the colloquial sense of the word, but we are there to solve them.

Our goal as authors is to help you solve your problems...

Result Page: 244 243 242 241 240 239 238 237 236 235 234 233 232 231 230 229 228 227 226 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy