- Table View
- List View
Learning C# Programming with Unity 3D
by Alex OkitaDesigned to give you enough familiarity in a programming language to be immediately productive, Learning C# Programming with Unity 3D provides the basics of programming and brings you quickly up to speed. Organized into easy-to-follow lessons, the book covers how C# is used to make a game in Unity3D. After reading this book, you will be armed with
Artificial Intelligence Tools: Decision Support Systems in Condition Monitoring and DIagnosis
by Diego Galar PascualArtificial Intelligence Tools: Decision Support Systems in Condition Monitoring and Diagnosis discusses various white- and black-box approaches to fault diagnosis in condition monitoring (CM). This indispensable resource:Addresses nearest-neighbor-based, clustering-based, statistical, and information theory-based techniquesConsiders the merits of e
The SAP Materials Management Handbook
by Ashfaque AhmedAlthough tens of thousands of global users have implemented Systems, Applications, and Products (SAP) for enterprise data processing for decades, there has been a need for a dependable reference on the subject, particularly for SAP materials management (SAP MM).Filling this need, The SAP Materials Management Handbook provides a complete understandi
C# Game Programming Cookbook for Unity 3D
by Jeff W. MurrayAn Accessible, Modular Style of Game Building-Easily Start Making Games with Unity 3DC# Game Programming Cookbook for Unity 3D presents a highly flexible core framework to create just about any type of game by plugging in different script components. Most scripts function within the game framework or in your own structures. The techniques and conce
Software Test Attacks to Break Mobile and Embedded Devices: Software Test Attacks To Break Mobile And Embedded Devices (Chapman And Hall/crc Innovations In Software Engineering And Software Development Ser. #6)
by Jon Duncan HagarAddress Errors before Users Find ThemUsing a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of "smart" devices driven by software, the book focuses on attack-based testing that can be used by
Introduction to Computer Networks and Cybersecurity
by Chwan-Hwa John WuIf a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effective
Information Technology: An Introduction for Today's Digital World
by Richard FoxInformation Technology: An Introduction for Today's Digital World introduces undergraduate students to a wide variety of concepts they will encounter throughout their IT studies and careers. The book covers computer organization and hardware, Windows and Linux operating systems, system administration duties, scripting, computer networks, regular ex
Distributed Systems: An Algorithmic Approach, Second Edition (Chapman And Hall/crc Computer And Information Science Ser.)
by Sukumar GhoshDistributed Systems: An Algorithmic Approach, Second Edition provides a balanced and straightforward treatment of the underlying theory and practical applications of distributed computing. As in the previous version, the language is kept as unobscured as possible-clarity is given priority over mathematical formalism. This easily digestible text:Fea
Determining Project Requirements: Mastering the BABOK and the CBAP Exam (Esi International Project Management Ser.)
by Hans JonassonGood requirements do not come from a tool, or from a customer interview. They come from a repeatable set of processes that take a project from the early idea stage through to the creation of an agreed-upon project and product scope between the customer and the developer.From enterprise analysis and planning requirements gathering to documentation,
The Internet of Things in the Cloud: A Middleware Perspective
by Honbo ZhouAlthough the Internet of Things (IoT) is a vast and dynamic territory that is evolving rapidly, there has been a need for a book that offers a holistic view of the technologies and applications of the entire IoT spectrum. Filling this void, The Internet of Things in the Cloud: A Middleware Perspective provides a comprehensive introduction to the Io
PCI Compliance: The Definitive Guide
by Abhay BhargavAlthough organizations that store, process, or transmit cardholder information are required to comply with payment card industry standards, most find it extremely challenging to comply with and meet the requirements of these technically rigorous standards. PCI Compliance: The Definitive Guide explains the ins and outs of the payment card industry (
Making Music with Computers: Creative Programming in Python (Chapman And Hall/crc Textbooks In Computing Ser. #13)
by Bill ManarisTeach Your Students How to Use Computing to Explore Powerful and Creative IdeasIn the twenty-first century, computers have become indispensable in music making, distribution, performance, and consumption. Making Music with Computers: Creative Programming in Python introduces important concepts and skills necessary to generate music with computers.
Enterprise Integration and Information Architecture: A Systems Perspective on Industrial Information Integration (Advances In Systems Science And Engineering (asse) Ser.)
by Li Da XuEnterprise solutions have emerged as promising tools for integrating and extending business processes across business functions. Supplying a clear and comprehensive introduction to the field, this book provides a detailed description of enterprise information integration-from the development of enterprise systems to extended enterprise information
Software and Systems Architecture in Action (Applied Software Engineering Ser.)
by Raghvinder S. SangwanModern-day projects require software and systems engineers to work together in realizing architectures of large and complex software-intensive systems. To date, the two have used their own tools and methods to deal with similar issues when it comes to the requirements, design, testing, maintenance, and evolution of these architectures.Software and
Official ((isc)2 Press Ser.)
by Mano PaulAs the global leader in information security education and certification, (ISC)2 has a proven track record of educating and certifying information security professionals. Its newest certification, the Certified Secure Software Lifecycle Professional (CSSLP) is a testament to the organization's ongoing commitment to information and software security
Fundamentals of EMS, NMS and OSS/BSS
by Jithesh SathyanIn this era where data and voice services are available at a push of a button, service providers have virtually limitless options for reaching their customers with value-added services. The changes in services and underlying networks that this always-on culture creates make it essential for service providers to understand the evolving business logi
Enterprise Security Architecture: A Business-Driven Approach
by Nicholas SherwoodSecurity is too important to be left in the hands of just one department or employee-it's a concern of an entire enterprise. Enterprise Security Architecture shows that having a comprehensive plan requires more than the purchase of security software-it requires a framework for developing and maintaining a system that is proactive. The book is based
3D Math Primer for Graphics and Game Development (Wordware Game Math Library)
by Fletcher Dunn Ian ParberryThis engaging book presents the essential mathematics needed to describe, simulate, and render a 3D world. Reflecting both academic and in-the-trenches practical experience, the authors teach you how to describe objects and their positions, orientations, and trajectories in 3D using mathematics. The text provides an introduction to mathematics for
Official: Guide to the CISSP CBK ((ISC)2 Press)
by Adam Gordon<p>As a result of a rigorous, methodical process that (ISC)² follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC)² conducts this process on a regular basis to ensure that the examinations and subsequent training and continuing professional education requirements encompass the topic areas relevant to the roles and responsibilities of today’s practicing information security professionals. <p>Refreshed technical content has been added to the official (ISC)² CISSP CBK to reflect the most current topics in the information security industry today. Some topics have been expanded (e.g., asset security, security assessment and testing), while other topics have been realigned under different domains. The result is an exam that most accurately reflects the technical and managerial competence required from an experienced information security professional to effectively design, engineer, implement and manage an organization’s information security program within an ever-changing security landscape.</p>
Data Science in R: A Case Studies Approach to Computational Reasoning and Problem Solving (Chapman And Hall/crc The R Ser. #26)
by Deborah Nolan Duncan Temple LangEffectively Access, Transform, Manipulate, Visualize, and Reason about Data and ComputationData Science in R: A Case Studies Approach to Computational Reasoning and Problem Solving illustrates the details involved in solving real computational problems encountered in data analysis. It reveals the dynamic and iterative process by which data analysts
RapidMiner: Data Mining Use Cases and Business Analytics Applications (Chapman And Hall/crc Data Mining And Knowledge Discovery Ser. #33)
by Markus HofmannPowerful, Flexible Tools for a Data-Driven WorldAs the data deluge continues in today's world, the need to master data mining, predictive analytics, and business analytics has never been greater. These techniques and tools provide unprecedented insights into data, enabling better decision making and forecasting, and ultimately the solution of incre
Blender for Animation and Film-Based Production
by Michelangelo ManriqueSee Why Blender Is Right for Your Studio's PipelineBlender for Animation and Film-Based Production explores why Blender is ideal for animation films. It demonstrates Blender's capability to do the job in each production department. Whether you are a beginner or more advanced user, you'll see why Blender should be taken into consideration in animati
Signals and Systems: A MATLAB Integrated Approach
by Oktay AlkinDrawing on the author's 25+ years of teaching experience, Signals and Systems: A MATLAB Integrated Approach presents a novel and comprehensive approach to understanding signals and systems theory. Many texts use MATLAB as a computational tool, but Alkin's text employs MATLAB both computationally and pedagogically to provide interactive, visual rein
HTML5 Game Engines: App Development and Distribution
by Dan NagleThis book is an introduction to development with HTML5 game engines, an in-depth look at some popular engines, downloadable example projects for each engine, and techniques on how to package and distribute the final app to all the major platforms.
A Concise Introduction to Data Structures using Java (Chapman And Hall/crc Textbooks In Computing Ser. #11)
by Mark J. JohnsonA student-friendly text, A Concise Introduction to Data Structures Using Java takes a developmental approach, starting with simpler concepts first and then building toward greater complexity. Important topics, such as linked lists, are introduced gradually and revisited with increasing depth. More code and guidance are provided at the beginning, al