El Hombre de las Sombras BLuRayRip | VINČESTERIO KOŠMARAS / Winchester (2018) | Gohoubi wa Game no Ato ni
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Unreal Engine 4 Game Development Essentials
Unreal Engine 4 Game Development Essentials

Key Features

  • Get to grips with the user interface of Unreal Engine 4 and find out more about its various robust features
  • Create dream video games with the help of the different tools Unreal Engine 4 offers
  • Create video-games and fully utilize the power of Unreal Engine 4 to bring games to...
Programming in Lua, Second Edition
Programming in Lua, Second Edition

Lua is the language of choice for anyone who needs a scripting language that is simple, efficient, extensible, portable, and free. Currently, Lua is being used in areas ranging from embedded systems to Web development and is widely spread in the game industry, where knowledge of Lua is an indisputable asset. "Programming in Lua" is...

Tika in Action
Tika in Action

Summary

Tika in Action is a hands-on guide to content mining with Apache Tika. The book's many examples and case studies offer real-world experience from domains ranging from search engines to digital asset management and scientific data processing.

About the Technology

Tika is an...

CryENGINE 3 Game Development: Beginner's Guide
CryENGINE 3 Game Development: Beginner's Guide

Discover how to use the CryENGINE 3 free SDK, the next-generation, real-time game development tool

  • Begin developing your own games of any scale by learning to harness the power of the Award Winning CryENGINE® 3 game engine
  • Build your game worlds in real-time with CryENGINE® 3 Sandbox as we share...
ITIL Service Transition 2011 Edition (Best Management Practices)
ITIL Service Transition 2011 Edition (Best Management Practices)

The ITIL Editions 2011 has been updated for clarity, consistency, correctness and completeness. By focusing on delivery and control process activities, ITIL Service Operation describes how a highly desirable steady state of managing services can be achieved on a day-to-day basis. Key Features The updated ITIL publications share a similar...

Threat Modeling: Designing for Security
Threat Modeling: Designing for Security

The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!

Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he
...

The Perfectionist's Handbook: Take Risks, Invite Criticism, and Make the Most of Your Mistakes
The Perfectionist's Handbook: Take Risks, Invite Criticism, and Make the Most of Your Mistakes

A guide for getting your perfectionism to work for you

Is perfectionism a good thing or does it get in our way? In The Perfectionist's Handbook, clinical psychologist Jeff Szymanski helps readers navigate their way out of the "perfectionism paradox": if your intentions are good (wanting to excel) and the...

Losing It! Behaviors and Mindsets that Ruin Careers: Lessons on Protecting Yourself from Avoidable Mistakes
Losing It! Behaviors and Mindsets that Ruin Careers: Lessons on Protecting Yourself from Avoidable Mistakes

Why do otherwise brilliant and successful leaders fail – and often do so dramatically? How can you prevent your own career “train wreck” by learning from their experiences? This book distills the core causes of executive failure, demonstrates how to identify them in your own behavior – and helps you to eliminate...

Linux Shell Scripting with Bash
Linux Shell Scripting with Bash
With the proliferation of Linux as both a server and desktop operating system, users are looking for more advanced methods of getting up and running quickly and efficiently solving problems. The most powerful way of achieving this is to employ the command line interface known as the shell. Bash, the Bourne Again Shell, is the most popular Linux...
Structured Finance Modeling with Object-Oriented VBA (Wiley Finance)
Structured Finance Modeling with Object-Oriented VBA (Wiley Finance)
Praise for STRUCTURED FINANCE MODELING with Object-Oriented VBA

"This book is an excellent and interesting integration of financial engineering, structured finance, and structured programming, and the book accomplishes this with easy-to-follow examples, using the most commonly available tools, MS VBA and spreadsheets. The author is clearly...

Automatic Algorithm Recognition and Replacement: A New Approach to Program Optimization
Automatic Algorithm Recognition and Replacement: A New Approach to Program Optimization
Optimizing compilers have a fundamental problem. No matter how powerful their optimizations
are, they are no substitute for good application algorithms. Consider the case of
sorting. For sufficiently large data sets, a merge sort algorithm compiled with a less powerful
optimizer will always out-perform a selection sort algorithm
...
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

Result Page: 23 22 21 20 19 18 17 16 15 14 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy