The book contains essays contributed by prominent software and design professionals, interviews with experts, and profiles of successful projects and products. These elements are woven together to ill
Game Programming Algorithms and Techniques is a broad overview of many of the important algorithms and techniques used in video game programming. It features a unique framework-agnostic approach, so t
Unique among Java books, A Programmer's Guide to OCP Java SE 7 Certification, A Comprehensive Primer, Fourth Edition combines an integrated, expert guide to Java SE 7 with comprehensive review for
The Definitive, Up-to-Date Guide to Digital Forensics: Laws, Tools, Methods, Challenges, and Careers The rapid proliferation of cyber crime is increasing the demand for digital forensics experts i
This is the definitive, up-to-date practitioner's guide to planning, deploying, and troubleshooting comprehensive security plans with Cisco ASA. Written by two experienced Cisco Security and VPN Solut
Today, both architects and business leaders understand the importance of networks to competitive advantage. Recognizing this, they are seeking better ways to architect and evolve networks based on the
Interconnecting Cisco Network Devices, Part 2 (ICND2), is the Cisco-authorized, self-paced learning tool for CCNA foundation learning. This book provides you with the knowledge needed to install, oper
If organisations are to achieve the ultimate corporate goal of maximising shareholder value, then understanding valuation is vitally important. Yet the majority of managers have ignored the area of co
This book shows how you can publish [LATEX] documents on the Web. [LATEX] was born of the scientist's need to prepare well-formatted information, particularly with pictures and mathematics included; t
Master and apply both the technical and behavioral skills you need to succeed in any inventory management role or function! Now, there’s an authoritative and comprehensive guide to best-practice inven
Haugdahl's company provides resources for network analysis. Here he offers protocol information and troubleshooting strategies to help administrators keep networks running at peak performance. He has
Jim and Michele McCarthy worked previously on successful software development teams at Microsoft and elsewhere before establishing a hands-on laboratory in 1996, for the study and teaching of teamwork
The Capability Maturity Model (CMM), managed by the Software Engineering Institute at Carnegie Mellon U., is a widely adopted set of guidelines for software process improvement and assessment. In deta
A guide and reference on geometric dimensioning and tolerancing, the technical drawing language for designing and manufacturing component parts of a mechanical product. This revised and updated editio
Twenty-nine papers, 15 of them first published in special issues of the journals ACM transactions on computer-human interaction and Human-computer interactions , make up this assessment of the stat
The #1 Guide to Excellence in Technical Communication—Fully Updated for Embedded Assistance, Mobile, Search, Multimedia, and MoreDirect from IBM’s own content design experts, this guide shows you how
For programmers creating applications based on it, network engineers creating new implementations of it, and network managers, Callaghan, a software engineer at Sun Microsystems, explains the Network