Home | Amazing | Today | Tags | Publishers | Years | Search 
Developing Turn-Based Multiplayer Games: with GameMaker Studio 2 and NodeJS
Developing Turn-Based Multiplayer Games: with GameMaker Studio 2 and NodeJS
Create your first turn-based multiplayer game using GameMaker Studio 2’s built-in networking functions as well as using a simple NodeJS server. This book introduces you to the complexities of network programming and communication, where the focus will be on building the game from the ground up.  You will...
HTML5 and JavaScript Projects: Build on your Basic Knowledge of HTML5 and JavaScript to Create Substantial HTML5 Applications
HTML5 and JavaScript Projects: Build on your Basic Knowledge of HTML5 and JavaScript to Create Substantial HTML5 Applications
Build on your basic knowledge of HTML5 and JavaScript to create substantial HTML5 applications. Through the many interesting projects you can create in this book, you'll develop HTML5 skills for future projects, and extend the core skills you may have learned with its companion book, The Essential Guide to HTML5.

...

UX Optimization: Combining Behavioral UX and Usability Testing Data to Optimize Websites
UX Optimization: Combining Behavioral UX and Usability Testing Data to Optimize Websites
Combine two typically separate sources of data?behavioral quantitative data and usability testing qualitative data?into a powerful single tool that helps improve your organization’s website by increasing conversion and ROI. The combination of the what is happening data of website activity, coupled with the...
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents

Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support.

Surviving an incident, or a...

Monetizing Machine Learning: Quickly Turn Python ML Ideas into Web Applications on the Serverless Cloud
Monetizing Machine Learning: Quickly Turn Python ML Ideas into Web Applications on the Serverless Cloud

Take your Python machine learning ideas and create serverless web applications accessible by anyone with an Internet connection. Some of the most popular serverless cloud providers are covered in this book?Amazon, Microsoft, Google, and PythonAnywhere.

You will work through a series of common Python data science problems...

Regex Quick Syntax Reference: Understanding and Using Regular Expressions
Regex Quick Syntax Reference: Understanding and Using Regular Expressions
This quick guide to regular expressions is a condensed code and syntax reference for an important programming technique. It demonstrates regex syntax in a well-organized format that can be used as a handy reference, showing you how to execute regexes in many languages, including JavaScript, Python, Java, and...
Learn to Program with Python 3: A Step-by-Step Guide to Programming
Learn to Program with Python 3: A Step-by-Step Guide to Programming

Move from zero knowledge of programming to comfortably writing small to medium-sized programs in Python. Fully updated for Python 3, with code and examples throughout, the book explains Python coding with an accessible, step-by-step approach designed to bring you comfortably into the world of software development.

...
Beginning Fedora Desktop: Fedora 28 Edition
Beginning Fedora Desktop: Fedora 28 Edition

Get the most out of Fedora 28 Desktop, including free Office suites, editors, e-book readers, music and video applications. In addition to those features, you’ll also work with codecs, email clients, web browsers, FTP and BitTorrent clients, VoIP clients, and IM applications. The major Fedora 28 desktop spins are covered in...

Introducing InnoDB Cluster: Learning the MySQL High Availability Stack
Introducing InnoDB Cluster: Learning the MySQL High Availability Stack
Set up, manage, and configure the new InnoDB Cluster feature in MySQL from Oracle. If you are growing your MySQL installation and want to explore making your servers highly available, this book provides what you need to know about high availability and the new tools that are available in MySQL 8.0.11 and later. 

...
SQL Server 2017 Query Performance Tuning: Troubleshoot and Optimize Query Performance
SQL Server 2017 Query Performance Tuning: Troubleshoot and Optimize Query Performance

Identify and fix causes of poor performance. You will learn Query Store, adaptive execution plans, and automated tuning on the Microsoft Azure SQL Database platform. Anyone responsible for writing or creating T-SQL queries will find valuable the insight into bottlenecks, including how to recognize them and eliminate them.

...

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

How Open Source Ate Software: Understand the Open Source Movement and So Much More
How Open Source Ate Software: Understand the Open Source Movement and So Much More

Learn how free software became open source and how you can sell open source software. This book provides a historical context of how open source has thoroughly transformed how we write software, how we cooperate, how we communicate, how we organize, and, ultimately, how we think about business values.

You’ll look...

Result Page: Previous 2198 2199 2200 2201 2202 2203 2204 2205 2206 2207 2208 2209 2210 2211 2212 2213 2214 2215 2216 2217 2218 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy