eBooks-it.org Logo
eBooks-IT.org Inner Image

Sep 22 2015 Added eBooks

Download free Sep 22 2015 Added eBooks

Build an HTML5 Game

Build an HTML5 Game Image
If you already have even basic familiarity with HTML, CSS, and JavaScript, you're ready to learn how to build a browser-based game. In Build an HTML5 Game, you'll use your skills to create a truly cross-platform bubble-shooter game - playable in both desktop and mobile browsers.As you follow along with this in-depth, hands-on tutorial, you'll learn how to:Send sprites zooming around the screen with JavaScript animationsMake things explode with a jQuery plug-inUse hitboxes and geometry to detect collisionsImplement game logic to display levels and respond to player inputConvey changes in game state with animation and soundAdd flair to a game interface with CSS transitions and transformationsGain pixel-level control over your game display with the HTML...

In-Memory Data Management

Technology and Applications
In-Memory Data Management Image
2nd Edition
In the last fifty years the world has been completely transformed through the use of IT. We have now reached a new inflection point. This book presents, for the first time, how in-memory data management is changing the way businesses are run. Today, enterprise data is split into separate databases for performance reasons. Multi-core CPUs, large main memories, cloud computing and powerful mobile devices are serving as the foundation for the transition of enterprises away from this restrictive model. This book provides the technical foundation for processing combined transactional and analytical operations in the same database. In the year since we publi...

Machining and Machine-Tools

Research and Development
Machining and Machine-Tools Image
This book is the third in the Woodhead Publishing Reviews: Mechanical Engineering Series, and includes high quality articles (full research articles, review articles and case studies) with a special emphasis on research and development in machining and machine-tools. Machining and machine tools is an important subject with application in several industries. Parts manufactured by other processes often require further operations before the product is ready for application. Traditional machining is the broad term used to describe removal of material from a work piece, and covers chip formation operations including: turning, milling, drilling and grinding. Recently the industrial utilization of non-traditional machining processes such as EDM (electrical ...

The Hash Function BLAKE

The Hash Function BLAKE Image
This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BLAKE2, an improved version popular among developers. It describes how BLAKE was designed and why BLAKE2 was developed, and it offers guidelines on implementing and using BLAKE, with a focus on software implementation.In the first two chapters, the authors offer a short introduction to cryptographic hashing, the SHA3 competition and BLAKE. They review applications of cryptographic hashing, they describe some basic notions such as security definitions and state-of-the-art collision search methods and they present SHA1, SHA2 and the SHA3 finalists. In the chapters that follow, the authors give a complete de...

Financial Cryptography and Data Security FC 2008

12th International Conference
Financial Cryptography and Data Security FC 2008 Image
This volume contains the proceedings of the 12th Financial Cryptography and DataSecurityInternationalConference,heldinCozumel,Mexico,January28-31 2008. Financial cryptography (FC) and data security has been for years the main international forum for research,advanced development, education, exploration, and debate regarding information assurance in the context of ?nance and commerce. Despite the strong competition from other top-tier related security conf- ences, the Program Committee received a signi?cant number of submissions, indicating a growingacceptance of FC as the premier ?nancialand data security forum. The ProgramCommittee, led by the PCChair Gene Tsudik, achievedan excellent program balance between research, practice, and panel sessions. T...


2007 - 2017 © eBooks-IT.org