Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Game Development Patterns and Best Practices: Better games, less hassle
Game Development Patterns and Best Practices: Better games, less hassle

Utilize proven solutions to solve common problems in game development

About This Book

  • Untangle your game development workflow, make cleaner code, and create structurally solid games
  • Implement key programming patterns that will enable you to make efficient AI and remove duplication
  • ...
Power Management Integrated Circuits (Devices, Circuits, and Systems)
Power Management Integrated Circuits (Devices, Circuits, and Systems)

Power Management Integrated Circuits and Technologies delivers a modern treatise on mixed-signal integrated circuit design for power management. Comprised of chapters authored by leading researchers from industry and academia, this definitive text:

  • Describes circuit- and architectural-level innovations...
MySQL 8 for Big Data: Effective data processing with MySQL 8, Hadoop, NoSQL APIs, and other Big Data tools
MySQL 8 for Big Data: Effective data processing with MySQL 8, Hadoop, NoSQL APIs, and other Big Data tools

Uncover the power of MySQL 8 for Big Data

About This Book

  • Combine the powers of MySQL and Hadoop to build a solid Big Data solution for your organization
  • Integrate MySQL with different NoSQL APIs and Big Data tools such as Apache Sqoop
  • A comprehensive guide with practical...
Certified Ethical Hacker (CEH) Foundation Guide
Certified Ethical Hacker (CEH) Foundation Guide

Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation...

The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

Network Routing: Fundamentals, Applications, and Emerging Technologies
Network Routing: Fundamentals, Applications, and Emerging Technologies

Network Routing: Fundamentals, Applications and Emerging Technologies serves as single point of reference for both advanced undergraduate and graduate students studying network routing, covering both the fundamental and more moderately advanced concepts of routing in traditional data networks such as the Internet, and emerging routing...

Macs For Dummies
Macs For Dummies

Take a bite out of all your Mac has to offer with this bestselling guide

So, you joined the cool kids club and bought a Mac. Kudos! Now, do you dare admit to your sophisticated Mac mates that you still need some help figuring out how it works? No worries, Macs For Dummies is here to help! In full color for the first...

Exploring Microsoft Office Excel 2016 Comprehensive (Book Only, No MyITLab Included) (Exploring for Office 2016 Series)
Exploring Microsoft Office Excel 2016 Comprehensive (Book Only, No MyITLab Included) (Exploring for Office 2016 Series)

This book offers full, comprehensive coverage of Microsoft Excel.

Beyond point-and-click

The goal of the Exploring series is to move students beyond the point-and-click, to understanding the why and how behind each skill. And...

Java Programming (Introduction to Programming)
Java Programming (Introduction to Programming)

JAVA PROGRAMMING, Sixth Edition provides the beginning programmer with a guide to developing applications using the Java programming language. Java is popular among professional programmers because it can be used to build visually interesting GUI and Web-based applications. Java also provides an excellent environment for the beginning...

99 Tricks and Traps for Microsoft Project 2013 and 2016
99 Tricks and Traps for Microsoft Project 2013 and 2016

The casual users survival guide! For users who understand the basics and want a brief text to demonstrate the less intuitive functions. The book is aimed at Project Management Professionals who are casual or new users and understand the software basics but require a short and snappy guide. It is the sort of book that may be read without a...

Securing Your Internet Life: A Step By Step Guide to Secure Yourself Online
Securing Your Internet Life: A Step By Step Guide to Secure Yourself Online

It’s a well-known fact that scouring through the online world not just conveys accommodation to the world all in all, however there are numerous things that you can do online today that you couldn't do a few years prior. Not just would you be able to now shop online for all intents and purposes anything that you require, yet you can...

Refactoring JavaScript: Turning Bad Code Into Good Code
Refactoring JavaScript: Turning Bad Code Into Good Code

If your JavaScript is a mess, frameworks can only do so much to help. No matter what framework, "compiles-to-JS" language, or library you use, bugs and performance concerns will always be an issue if the underlying quality of your JavaScript is poor. With this hands-on guide, you’ll learn how test and refactor your...

unlimited object storage image
Result Page: 3136 3135 3134 3133 3132 3131 3130 3129 3128 3127 3126 3125 3124 3123 3122 3121 3120 3119 3118 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy