|
|
|
|
Unity Multiplayer Games
Take your gaming development skills into the online multiplayer arena by harnessing the power of Unity 4 or 3. This is not a dry tutorial - it uses exciting examples and an enthusiastic approach to bring it all to life.
Overview
-
Create a variety of multiplayer games and apps in the Unity 4 game engine,...
| | Zend Framework 2 Cookbook
If you are pretty handy with PHP, this book is the perfect way to access and understand the features of Zend Framework 2. You can dip into the recipes as you wish and learn at your own pace.
Overview
-
Recipes to help you create, test, and optimize your applications
-
A useful guide for PHP...
| | Dreams of Other Worlds: The Amazing Story of Unmanned Space Exploration
Dreams of Other Worlds describes the unmanned space missions that have opened new windows on distant worlds. Spanning four decades of dramatic advances in astronomy and planetary science, this book tells the story of eleven iconic exploratory missions and how they have fundamentally transformed our scientific and cultural perspectives... |
|
Branding For Dummies
Discover how brands are created, managed, differentiated, leveraged, and licensed
Whether your business is large or small, global or local, this new edition of Branding For Dummies gives you the nuts and bolts to create, improve, and maintain a successful brand. It'll help you define your company's mission,... | | Crop Improvement Under Adverse Conditions
Plant development and productivity are negatively regulated by various environmental stresses. Abiotic stress factors such as heat, cold, drought, and salinity represent key elements limiting agricultural productivity worldwide. Thus, developing crop plants with the ability to tolerate abiotic stresses is a critical need which demands modern... | | Dynamic Secrets in Communication Security
Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in... |
|
Result Page: 2673 2672 2671 2670 2669 2668 2667 2666 2665 2664 2663 2662 2661 2660 2659 2658 2657 2656 2655 |