Home | Amazing | Today | Tags | Publishers | Years | Search 
Game On: Energize Your Business with Social Media Games
Game On: Energize Your Business with Social Media Games

A never-before published look at the many possibilities of social game development

As one of the few entrepreneurs in the world with expertise building both social media and games, author Jon Radoff brings a one-of-a-kind perspective to this unique book. He shows that games are more than a profitable form of...

An Introduction to Algorithmic Trading: Basic to Advanced Strategies (Wiley Trading)
An Introduction to Algorithmic Trading: Basic to Advanced Strategies (Wiley Trading)

Interest in algorithmic trading is growing massively – it’s cheaper, faster and better to control than standard trading, it enables you to ‘pre-think’ the market, executing complex math in real time and take the required decisions based on the strategy defined. We are no longer limited by human ‘bandwidth’....

All About Market Timing, Second Edition (All About Series)
All About Market Timing, Second Edition (All About Series)

Use market timing to generate positive returns―with lower volatility!

Events of the past decade have proven beyond doubt that buy-and-hold strategies don’t work in bear markets. Market timing, however, is extraordinarily effective in declining markets―and it provides positive returns in bull markets, as...

Core Concepts in Data Analysis: Summarization, Correlation and Visualization
Core Concepts in Data Analysis: Summarization, Correlation and Visualization

In this textbook, I take an unconventional approach to data analysis. Its contents are heavily influenced by the idea that data analysis should help in enhancing and augmenting knowledge of the domain as represented by the concepts and statements of relation between them. According to this view, two main pathways for data analysis are...

Pervasive Information Architecture: Designing Cross-Channel User Experiences
Pervasive Information Architecture: Designing Cross-Channel User Experiences

I knew the Internet before it got famous. There were places but no paths, no maps, no search engines. Entry required a key in the form of an IP address and an incantation in the language of UNIX. It was a small world that felt big because it was so easy to get lost in the shadowy realm of texts and data, completely devoid of color....

Introduction to Embedded Systems: A Cyber-Physical Systems Approach
Introduction to Embedded Systems: A Cyber-Physical Systems Approach

The most visible use of computers and software is processing information for human consumption. We use them to write books (like this one), search for information on the web, communicate via email, and keep track of financial data. The vast majority of computers in use, however, are much less visible. They run the engine, brakes,...

Between Crown and Commerce: Marseille and the Early Modern Mediterranean (The Johns Hopkins University Studies in Historical and Political Science)
Between Crown and Commerce: Marseille and the Early Modern Mediterranean (The Johns Hopkins University Studies in Historical and Political Science)

Between Crown and Commerce examines the relationship between French royal statecraft, mercantilism, and civic republicanism in the context of the globalizing economy of the early modern Mediterranean world.

This is the story of how the French Crown and local institutions accommodated one another as they sought to forge...

BackTrack 4: Assuring Security by Penetration Testing
BackTrack 4: Assuring Security by Penetration Testing

BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your...

Handbook of Security and Networks
Handbook of Security and Networks
As computing and networking technologies are gradually integrated with every aspect of human lives and activities, computer and network security has become a critical issue. The Handbook of Security and Networks presents a collection of recent advances in computer networking and security areas. These include applied...
Programming with Microsoft Visual Basic 2010 (VB.Net Programming)
Programming with Microsoft Visual Basic 2010 (VB.Net Programming)
PROGRAMMING WITH MICROSOFT VISUAL BASIC 2010, FIFTH EDITION by the best-selling author, Diane Zak, is designed for a first course in programming. Using the most recent version of the software, Visual Basic 2010, this book teaches individuals how to use Visual Basic applications as they would in a real world setting. Students with no previous...
Moving Media Storage Technologies: Applications & Workflows for Video and Media Server Platforms
Moving Media Storage Technologies: Applications & Workflows for Video and Media Server Platforms

Storage technologies have fundamentally changed the landscape of digital media in a profound way. Gone are the days of using a single hard disk drive on a workstation as the sole means to store digital content. Nearly vanished is the practice of capturing video and audio only on videotape. The practice of transferring videotape...

The Complete Android Guide: 3Ones
The Complete Android Guide: 3Ones

Google's Android operating system for phones is definitely a moving target. During the production of this book's first version, the latest Android version available on a cutting-edge phone jumped from 1.6 to 2.2. In that time, too, phones made by HTC and Motorola became exceedingly popular, and modified versions of the Android...

Result Page: Previous 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy