Browse Results

Showing 31,426 through 31,450 of 53,753 results

Learning C# Programming with Unity 3D

by Alex Okita

Designed to give you enough familiarity in a programming language to be immediately productive, Learning C# Programming with Unity 3D provides the basics of programming and brings you quickly up to speed. Organized into easy-to-follow lessons, the book covers how C# is used to make a game in Unity3D. After reading this book, you will be armed with

Artificial Intelligence Tools: Decision Support Systems in Condition Monitoring and DIagnosis

by Diego Galar Pascual

Artificial Intelligence Tools: Decision Support Systems in Condition Monitoring and Diagnosis discusses various white- and black-box approaches to fault diagnosis in condition monitoring (CM). This indispensable resource:Addresses nearest-neighbor-based, clustering-based, statistical, and information theory-based techniquesConsiders the merits of e

The SAP Materials Management Handbook

by Ashfaque Ahmed

Although tens of thousands of global users have implemented Systems, Applications, and Products (SAP) for enterprise data processing for decades, there has been a need for a dependable reference on the subject, particularly for SAP materials management (SAP MM).Filling this need, The SAP Materials Management Handbook provides a complete understandi

C# Game Programming Cookbook for Unity 3D

by Jeff W. Murray

An Accessible, Modular Style of Game Building-Easily Start Making Games with Unity 3DC# Game Programming Cookbook for Unity 3D presents a highly flexible core framework to create just about any type of game by plugging in different script components. Most scripts function within the game framework or in your own structures. The techniques and conce

Software Test Attacks to Break Mobile and Embedded Devices: Software Test Attacks To Break Mobile And Embedded Devices (Chapman And Hall/crc Innovations In Software Engineering And Software Development Ser. #6)

by Jon Duncan Hagar

Address Errors before Users Find ThemUsing a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of "smart" devices driven by software, the book focuses on attack-based testing that can be used by

Introduction to Computer Networks and Cybersecurity

by Chwan-Hwa John Wu

If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effective

Information Technology: An Introduction for Today's Digital World

by Richard Fox

Information Technology: An Introduction for Today's Digital World introduces undergraduate students to a wide variety of concepts they will encounter throughout their IT studies and careers. The book covers computer organization and hardware, Windows and Linux operating systems, system administration duties, scripting, computer networks, regular ex

Distributed Systems: An Algorithmic Approach, Second Edition (Chapman And Hall/crc Computer And Information Science Ser.)

by Sukumar Ghosh

Distributed Systems: An Algorithmic Approach, Second Edition provides a balanced and straightforward treatment of the underlying theory and practical applications of distributed computing. As in the previous version, the language is kept as unobscured as possible-clarity is given priority over mathematical formalism. This easily digestible text:Fea

Determining Project Requirements: Mastering the BABOK and the CBAP Exam (Esi International Project Management Ser.)

by Hans Jonasson

Good requirements do not come from a tool, or from a customer interview. They come from a repeatable set of processes that take a project from the early idea stage through to the creation of an agreed-upon project and product scope between the customer and the developer.From enterprise analysis and planning requirements gathering to documentation,

The Internet of Things in the Cloud: A Middleware Perspective

by Honbo Zhou

Although the Internet of Things (IoT) is a vast and dynamic territory that is evolving rapidly, there has been a need for a book that offers a holistic view of the technologies and applications of the entire IoT spectrum. Filling this void, The Internet of Things in the Cloud: A Middleware Perspective provides a comprehensive introduction to the Io

PCI Compliance: The Definitive Guide

by Abhay Bhargav

Although organizations that store, process, or transmit cardholder information are required to comply with payment card industry standards, most find it extremely challenging to comply with and meet the requirements of these technically rigorous standards. PCI Compliance: The Definitive Guide explains the ins and outs of the payment card industry (

Making Music with Computers: Creative Programming in Python (Chapman And Hall/crc Textbooks In Computing Ser. #13)

by Bill Manaris

Teach Your Students How to Use Computing to Explore Powerful and Creative IdeasIn the twenty-first century, computers have become indispensable in music making, distribution, performance, and consumption. Making Music with Computers: Creative Programming in Python introduces important concepts and skills necessary to generate music with computers.

Enterprise Integration and Information Architecture: A Systems Perspective on Industrial Information Integration (Advances In Systems Science And Engineering (asse) Ser.)

by Li Da Xu

Enterprise solutions have emerged as promising tools for integrating and extending business processes across business functions. Supplying a clear and comprehensive introduction to the field, this book provides a detailed description of enterprise information integration-from the development of enterprise systems to extended enterprise information

Software and Systems Architecture in Action (Applied Software Engineering Ser.)

by Raghvinder S. Sangwan

Modern-day projects require software and systems engineers to work together in realizing architectures of large and complex software-intensive systems. To date, the two have used their own tools and methods to deal with similar issues when it comes to the requirements, design, testing, maintenance, and evolution of these architectures.Software and

Official ((isc)2 Press Ser.)

by Mano Paul

As the global leader in information security education and certification, (ISC)2 has a proven track record of educating and certifying information security professionals. Its newest certification, the Certified Secure Software Lifecycle Professional (CSSLP) is a testament to the organization's ongoing commitment to information and software security

Fundamentals of EMS, NMS and OSS/BSS

by Jithesh Sathyan

In this era where data and voice services are available at a push of a button, service providers have virtually limitless options for reaching their customers with value-added services. The changes in services and underlying networks that this always-on culture creates make it essential for service providers to understand the evolving business logi

Enterprise Security Architecture: A Business-Driven Approach

by Nicholas Sherwood

Security is too important to be left in the hands of just one department or employee-it's a concern of an entire enterprise. Enterprise Security Architecture shows that having a comprehensive plan requires more than the purchase of security software-it requires a framework for developing and maintaining a system that is proactive. The book is based

3D Math Primer for Graphics and Game Development (Wordware Game Math Library)

by Fletcher Dunn Ian Parberry

This engaging book presents the essential mathematics needed to describe, simulate, and render a 3D world. Reflecting both academic and in-the-trenches practical experience, the authors teach you how to describe objects and their positions, orientations, and trajectories in 3D using mathematics. The text provides an introduction to mathematics for

Official: Guide to the CISSP CBK ((ISC)2 Press)

by Adam Gordon

<p>As a result of a rigorous, methodical process that (ISC)² follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC)² conducts this process on a regular basis to ensure that the examinations and subsequent training and continuing professional education requirements encompass the topic areas relevant to the roles and responsibilities of today’s practicing information security professionals. <p>Refreshed technical content has been added to the official (ISC)² CISSP CBK to reflect the most current topics in the information security industry today. Some topics have been expanded (e.g., asset security, security assessment and testing), while other topics have been realigned under different domains. The result is an exam that most accurately reflects the technical and managerial competence required from an experienced information security professional to effectively design, engineer, implement and manage an organization’s information security program within an ever-changing security landscape.</p>

Data Science in R: A Case Studies Approach to Computational Reasoning and Problem Solving (Chapman And Hall/crc The R Ser. #26)

by Deborah Nolan Duncan Temple Lang

Effectively Access, Transform, Manipulate, Visualize, and Reason about Data and ComputationData Science in R: A Case Studies Approach to Computational Reasoning and Problem Solving illustrates the details involved in solving real computational problems encountered in data analysis. It reveals the dynamic and iterative process by which data analysts

RapidMiner: Data Mining Use Cases and Business Analytics Applications (Chapman And Hall/crc Data Mining And Knowledge Discovery Ser. #33)

by Markus Hofmann

Powerful, Flexible Tools for a Data-Driven WorldAs the data deluge continues in today's world, the need to master data mining, predictive analytics, and business analytics has never been greater. These techniques and tools provide unprecedented insights into data, enabling better decision making and forecasting, and ultimately the solution of incre

Blender for Animation and Film-Based Production

by Michelangelo Manrique

See Why Blender Is Right for Your Studio's PipelineBlender for Animation and Film-Based Production explores why Blender is ideal for animation films. It demonstrates Blender's capability to do the job in each production department. Whether you are a beginner or more advanced user, you'll see why Blender should be taken into consideration in animati

Signals and Systems: A MATLAB Integrated Approach

by Oktay Alkin

Drawing on the author's 25+ years of teaching experience, Signals and Systems: A MATLAB Integrated Approach presents a novel and comprehensive approach to understanding signals and systems theory. Many texts use MATLAB as a computational tool, but Alkin's text employs MATLAB both computationally and pedagogically to provide interactive, visual rein

HTML5 Game Engines: App Development and Distribution

by Dan Nagle

This book is an introduction to development with HTML5 game engines, an in-depth look at some popular engines, downloadable example projects for each engine, and techniques on how to package and distribute the final app to all the major platforms.

A Concise Introduction to Data Structures using Java (Chapman And Hall/crc Textbooks In Computing Ser. #11)

by Mark J. Johnson

A student-friendly text, A Concise Introduction to Data Structures Using Java takes a developmental approach, starting with simpler concepts first and then building toward greater complexity. Important topics, such as linked lists, are introduced gradually and revisited with increasing depth. More code and guidance are provided at the beginning, al

Refine Search

Showing 31,426 through 31,450 of 53,753 results