Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 267
- Application software 238
- Java (Computer program language) 185
- Big data 162
- Cloud computing 155
- Streaming video 152
- Engineering & Applied Sciences 129
- Management 128
- Data mining 126
- Electronic data processing 117
- Computer networks 111
- Database management 98
- Data processing 90
- Computer Science 86
- Machine learning 83
- Computer programming 82
- Computer programs 82
- Python (Computer program language) 75
- Computer software 70
- Examinations 68
- Artificial intelligence 67
- Distributed processing 64
- Security measures 61
- Computer security 58
- Information technology 58
- Operating systems (Computers) 57
- Programming 56
- Microsoft .NET Framework 55
- Design 54
- Software engineering 53
-
1721Publicado 2024Tabla de Contenidos: “…-- Creating a test fixture -- Using the test fixture -- Writing tests for methods that change the database -- Parallelism of xUnit -- Using the repository pattern -- Testing the happy path and the sad path -- Summary -- Chapter 10: Testing in ASP.NET Core (Part 2 - Integration Testing) -- Technical requirements -- Writing integration tests -- Setting up the integration test project -- Writing basic integration tests with WebApplicationFactory -- Testing with a database context -- Testing with mock services -- Testing with authentication and authorization -- Preparing the sample application -- Creating a test fixture -- Creating the test class -- Testing the anonymous API endpoints -- Testing the authorized API endpoints -- Code coverage -- Using data collectors -- Generating a code coverage report -- Summary -- Chapter 11: Getting Started with gRPC -- Technical requirements -- Recap of gRPC -- Setting up a gRPC project -- Creating a new gRPC project -- Understanding the gRPC project structure -- Creating protobuf messages -- Defining a protobuf message -- Understanding field numbers -- Understanding the field types -- Other .NET types -- Creating a protobuf service -- Defining a unary service -- Creating a gRPC client -- Defining a server streaming service -- Defining a client streaming service -- Defining a bidirectional streaming service -- Consuming gRPC services in ASP.NET Core applications -- Updating proto files -- Summary -- Further reading -- Chapter 12: Getting Started with GraphQL -- Technical requirements -- Recap of GraphQL…”
Libro electrónico -
1722por Ashok, KamthaneTabla de Contenidos: “…12.13 The Predefined Macros in ANSI and Turbo-C -- 12.14 Standard I/O Predefined Streams in stdio.h -- 12.15 The Predefined Marcos in ctype.h -- 12.16 Assertions -- Summary -- Exercises -- 13 Structure and Union -- 13.1 Introduction -- 13.2 Features of Structures -- 13.3 Declaration and Initialization of Structures -- 13.4 Structure within Structure -- 13.5 Array of Structures -- 13.6 Pointer to Structure -- 13.7 Structure and Functions -- 13.8 typedef -- 13.9 Bit Fields -- 13.10 Enumerated Data Type -- 13.11 Union -- 13.12 Calling BIOS and DOS Services -- 13.13 Union of Structures -- Summary -- Exercises -- 14 Files -- 14.1 Introduction of a File -- 14.2 Definition of File -- 14.3 Streams and File Types -- 14.3.1 File Types -- 14.4 Steps for File Operations -- 14.4.1 Opening of File -- 14.4.2 Reading a File -- 14.4.3 Closing a File -- 14.4.4 Text Modes -- 14.4.5 Binary Modes -- 14.5 File I/O -- 14.6 Structures Read and Write -- 14.7 Other File Function -- 14.8 Searching Errors in Reading/Writing Files -- 14.9 Low-Level Disk I/O -- 14.10 Command Line Arguments -- 14.11 Application of Command Line Arguments -- 14.12 Environment Variables -- 14.13 I/O Redirection -- Summary -- Exercises -- 15 Graphics -- 15.1 Introduction -- 15.2 Initialization of Graphics -- 15.3 Few Graphics Functions -- 15.4 Programs Using Library Functions -- 15.4.1 Program on Moving Moon -- 15.5 Working with Text -- 15.5.1 Stylish Lines -- 15.6 Filling Patterns with Different Colours and Styles -- 15.7 Mouse Programming -- 15.8 Drawing Non-common Figures -- Summary -- Exercises -- 16 Dynamic Memory Allocation and Linked List -- 16.1 Dynamic Memory Allocation -- 16.2 Memory Models -- 16.3 Memory Allocation Functions -- 16.4 List -- 16.5 Traversal of a List -- 16.6 Searching and Retrieving an Element -- 16.7 Predecessor and Successor -- 16.8 Insertion -- 16.9 Linked Lists…”
Publicado 2015
Libro electrónico -
1723Publicado 2017Tabla de Contenidos: “…Cover -- Notation -- Preface -- Contents -- About the Author -- Part One: Background -- Chapter 1 Computer and Network Security Concepts -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 Fundamental Security Design Principles -- 1.7 Attack Surfaces and Attack Trees -- 1.8 A Model for Network Security -- 1.9 Standards -- 1.10 Key Terms, Review Questions, and Problems -- Chapter 2 Introduction to Number Theory -- 2.1 Divisibility and the Division Algorithm -- 2.2 The Euclidean Algorithm -- 2.3 Modular Arithmetic -- 2.4 Prime Numbers -- 2.5 Fermat's and Euler's Theorems -- 2.6 Testing for Primality -- 2.7 The Chinese Remainder Theorem -- 2.8 Discrete Logarithms -- 2.9 Key Terms, Review Questions, and Problems -- Appendix 2A The Meaning of Mod -- Part Two: Symmetric Ciphers -- Chapter 3 Classical Encryption Techniques -- 3.1 Symmetric Cipher Model -- 3.2 Substitution Techniques -- 3.3 Transposition Techniques -- 3.4 Rotor Machines -- 3.5 Steganography -- 3.6 Key Terms, Review Questions, and Problems -- Chapter 4 Block Ciphers and the Data Encryption Standard -- 4.1 Traditional Block Cipher Structure -- 4.2 The Data Encryption Standard -- 4.3 A DES Example -- 4.4 The Strength of DES -- 4.5 Block Cipher Design Principles -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Finite Fields -- 5.1 Groups -- 5.2 Rings -- 5.3 Fields -- 5.4 Finite Fields of the Form GF(p) -- 5.5 Polynomial Arithmetic -- 5.6 Finite Fields of the Form GF(2n) -- 5.7 Key Terms, Review Questions, and Problems -- Chapter 6 Advanced Encryption Standard -- 6.1 Finite Field Arithmetic -- 6.2 AES Structure -- 6.3 AES Transformation Functions -- 6.4 AES Key Expansion -- 6.5 An AES Example -- 6.6 AES Implementation -- 6.7 Key Terms, Review Questions, and Problems -- Appendix 6A Polynomials with Coefficients in GF(28) -- Chapter 7 Block Cipher Operation -- 7.1 Multiple Encryption and Triple DES -- 7.2 Electronic Codebook -- 7.3 Cipher Block Chaining Mode -- 7.4 Cipher Feedback Mode -- 7.5 Output Feedback Mode -- 7.6 Counter Mode -- 7.7 XTS-AES Mode for Block-Oriented Storage Devices -- 7.8 Format-Preserving Encryption -- 7.9 Key Terms, Review Questions, and Problems -- Chapter 8 Random Bit Generation and Stream Ciphers -- 8.1 Principles of Pseudorandom Number Generation -- 8.2 Pseudorandom Number Generators -- 8.3 Pseudorandom Number Generation Using a Block Cipher -- 8.4 Stream Ciphers -- 8.5 RC4 -- 8.6 True Random Number Generators -- 8.7 Key Terms, Review Questions, and Problems -- Part Three: Asymmetric Ciphers 283 -- Chapter 9 Public-Key Cryptography and RSA -- 9.1 Principles of Public-Key Cryptosystems -- 9.2 The RSA Algorithm -- 9.3 Key Terms, Review Questions, and Problems -- Chapter 10 Other Public-Key Cryptosystems -- 10.1 Diffie-Hellman Key Exchange -- 10.2 Elgamal Cryptographic System -- 10.3 Elliptic Curve Arithmetic -- 10.4 Elliptic Curve Cryptography -- 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher -- 10.6 Key Terms, Review Questions, and Problems -- Part Four: Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- 11.1 Applications of Cryptographic Hash Functions -- 11.2 Two Simple Hash Functions -- 11.3 Requirements and Security -- 11.4 Hash Functions Based on Cipher Block Chaining -- 11.5 Secure Hash Algorithm (SHA) -- 11.6 SHA-3 -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Message Authentication Codes -- 12.1 Message Authentication Requirements -- 12.2 Message Authentication Functions -- 12.3 Requirements for Message Authentication Codes -- 12.4 Security of MACs -- 12.5 MACs Based on Hash Functions: HMAC -- 12.6 MACs Based on Block Ciphers: DAA and CMAC -- 12.7 Authenticated Encryption: CCM and GCM -- 12.8 Key Wrapping -- 12.9 Pseudorandom Number Generation Using Hash Functions and MACs -- 12.10 Key Terms, Review Questions, and Problems -- Chapter 13 Digital Signatures -- 13.1 Digital Signatures -- 13.2 Elgamal Digital Signature Scheme -- 13.3 Schnorr Digital Signature Scheme -- 13.4 NIST Digital Signature Algorithm -- 13.5 Elliptic Curve Digital Signature Algorithm -- 13.6 RSA-PSS Digital Signature Algorithm -- 13.7 Key Terms, Review Questions, and Problems -- Part Five: Mutual Trust -- Chapter 14 Key Management and Distribution -- 14.1 Symmetric Key Distribution Using Symmetric Encryption -- 14.2 Symmetric Key Distribution Using Asymmetric Encryption -- 14.3 Distribution of Public Keys -- 14.4 X.509 Certificates -- 14.5 Public-Key Infrastructure -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 User Authentication -- 15.1 Remote User-Authentication Principles -- 15.2 Remote User-Authentication Using Symmetric Encryption -- 15.3 Kerberos -- 15.4 Remote User-Authentication Using Asymmetric Encryption -- 15.5 Federated Identity Management -- 15.6 Personal Identity Verification -- 15.7 Key Terms, Review Questions, and Problems -- Part Six: Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- 16.1 Network Access Control -- 16.2 Extensible Authentication Protocol -- 16.3 IEEE 802.1X Port-Based Network Access Control -- 16.4 Cloud Computing -- 16.5 Cloud Security Risks and Countermeasures -- 16.6 Data Protection in the Cloud -- 16.7 Cloud Security as a Service -- 16.8 Addressing Cloud Computing Security Concerns -- 16.9 Key Terms, Review Questions, and Problems -- Chapter 17 Transport-Level Security -- 17.1 Web Security Considerations -- 17.2 Transport Layer Security -- 17.3 HTTPS -- 17.4 Secure Shell (SSH) -- 17.5 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Network Security -- 18.1 Wireless Security -- 18.2 Mobile Device Security -- 18.3 IEEE 802.11 Wireless LAN Overview -- 18.4 IEEE 802.11i Wireless LAN Security -- 18.5 Key Terms, Review Questions, and Problems -- Chapter 19 Electronic Mail Security -- 19.1 Internet Mail Architecture -- 19.2 Email Formats -- 19.3 Email Threats and Comprehensive Email Security -- 19.4 S/MIME -- 19.5 Pretty Good Privacy -- 19.6 DNSSEC -- 19.7 DNS-Based Authentication of Named Entities -- 19.8 Sender Policy Framework -- 19.9 DomainKeys Identified Mail -- 19.10 Domain-Based Message Authentication, Reporting, and Conformance -- 19.11 Key Terms, Review Questions, and Problems -- Chapter 20 IP Security -- 20.1 IP Security Overview -- 20.2 IP Security Policy -- 20.3 Encapsulating Security Payload -- 20.4 Combining Security Associations -- 20.5 Internet Key Exchange -- 20.6 Cryptographic Suites -- 20.7 Key Terms, Review Questions, and Problems -- APPENDICES 696 -- Appendix A Projects for Teaching Cryptography and Network Security -- A.1 Sage Computer Algebra Projects -- A.2 Hacking Project -- A.3 Block Cipher Projects -- A.4 Laboratory Exercises -- A.5 Research Projects -- A.6 Programming Projects -- A.7 Practical Security Assessments -- A.8 Firewall Projects -- A.9 Case Studies -- A.10 Writing Assignments -- A.11 Reading/Report Assignments -- A.12 Discussion Topics -- Appendix B Sage Examples -- B.1 Linear Algebra and Matrix Functionality -- B.2 Chapter 2: Number Theory -- B.3 Chapter 3: Classical Encryption -- B.4 Chapter 4: Block Ciphers and the Data Encryption Standard -- B.5 Chapter 5: Basic Concepts in Number Theory and Finite Fields -- B.6 Chapter 6: Advanced Encryption Standard -- B.7 Chapter 8: Pseudorandom Number Generation and Stream Ciphers -- B.8 Chapter 9: Public-Key Cryptography and RSA -- B.9 Chapter 10: Other Public-Key Cryptosystems -- B.10 Chapter 11: Cryptographic Hash Functions -- B.11 Chapter 13: Digital Signatures…”
Libro electrónico -
1724por Jiménez de Parga, CarlosTabla de Contenidos: “…10.7 sincronización -- 10.8 simplificación del diagrama -- 10.9 historial -- 10.10 caso de estudio -- 10.11 caso de estudio -- 11 diagramas de actividad -- 11.1 estructura -- 11.2 estructuras -- 11.3 eventos de -- 11.4 nodos objeto -- 11.5 nodos de dat -- 11.6 particiones -- 11.7 parametrización -- 11.8 r egiones -- 11.9 Manejo de excepciones -- 11.10 conectores -- 11.11 señales y eventos -- 11.12 múlt iples flujos -- 11.13 streaming -- 11.14 mult icasting -- 11.15 caso de estudio -- 11.16 caso de estudio -- 12 Diagramas de estructura compuesta -- 12.1 estructura -- 12.2 colaboraciones -- 12.3 uso de la colaboración -- 12.4 caso de estudio -- 12.5 caso de estudio -- 13 OCL (Object constraint language -- 13.1 estructura -- 13.2 t ipos y operadores -- 13.3 m odelo de referencia -- 13.4 expresiones de restricción -- 13.5 expresiones de definición -- 13.6 C olecciones -- 13.7 navegación -- 13.8 ocl en los diagramas -- 13.9 caso de estudio: -- 13.10 caso de estudio -- 14 ingeniería directa en jav -- 14.1 d iagramas de clases -- 14.2 d iagramas de secuencias -- 14.3 d iagramas de -- 14.4 caso de estudio -- 15 ingeniería directa en c++ -- 15.1 d iagramas -- 15.2 d iagramas de secuencias -- 15.3 d iagramas -- 15.4 caso de estudio -- Anexo A -- Anexo B -- Bibliografía -- Índice alafabético…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1725Publicado 2016“…Version 3.1, updated 10/8/2020 Whether you're considering an Apple TV, already own one, or have a smart TV or streaming device that supports AirPlay and/or the Apple TV app, you can more fully enjoy Apple’s ecosystem with this ultimate guide by TidBITS managing editor Josh Centers. …”
Libro electrónico -
1726Publicado 2018Tabla de Contenidos: “…Cover -- Title -- Copyright -- CONTENTS -- About the Author -- Overview -- 1 Music Industry Study and Facts -- Music Lifestyle -- Today's Celebrity Culture -- Mobile Music -- Downloading and Streaming -- Musical Merchandising -- Advertising Is OK -- Evaluating Your Fans, Artists and Overall Brand -- Current Trend Predictions in Today's Music Market -- TV Trends -- Longer Hours -- Airtime Availability -- Coverage -- New Trends/Platforms of Music Video Promotion -- YouTube (the Ultimate Video Promotion Platform) -- YouTube Statistics -- Promotional Strategies of Music Videos -- 2 Music Copyright, Publishing and Licensing -- Copyright -- Music Publishing -- What Music Publishers Do -- Performing Rights Organizations -- The Business of Music Licensing -- Music Licensing Company Listing -- 3 Manufacturing Processes, Systems, Product Platforms and Music Production -- Manufacturing Processes -- Press on Demand -- Digital Download Cards -- Product Platforms -- Music Video: Pre-and Post-Production -- Understanding the Entire Production Process -- MVPA -- 4 Types of Distributors and Indie Distribution Associations -- Distribution Platforms -- (Major) Independent Distributors -- Independent Distributors -- One-Stop Distributors -- Rack Jobbers -- Exporters -- Digital Distribution -- Independent Distribution Associations -- 5 Distribution Processes -- Music Distribution Process -- Returns -- Pricing -- Distribution Payment Terms -- Protect Yourself -- Invoicing -- Request for Return -- Getting Started -- Distributors and Promotion -- Doing Business With a Distributor -- Collection -- 6 Distribution Resources -- Catalogs and Databases -- Commercial Radio/College/Internet Tracking Services -- How to Get a UPC Number for Your Product -- ISRC -- 7 Alternative Selling and Total Exposure -- Cutouts, Repackaging -- Mail Order -- Placing Ads -- Branding the Music…”
Libro electrónico -
1727por Schwartz, Alan, 1970-Tabla de Contenidos: “…Verifying the MIMEDefang processesCustomizing MIMEDefang; SpamAssassin Integration; Adding sitewide Bayesian filtering; Adding sitewide autowhitelisting; Adding per-domain or per-user streaming; Building a Spam-Checking Gateway; sendmail Configuration; SpamAssassin Configuration; MIMEDefang Configuration; Routing Email; Internal Server Configuration; Testing; Integrating SpamAssassin with Postfix; Postfix Architecture; Spam-Checking During Local Delivery; Spam-Checking All Incoming Mail; Using a Program as a Content Filter; Using a Daemon as a Content Filter…”
Publicado 2004
Libro electrónico -
1728por Rose, JayTabla de Contenidos: “…Layback and Print MasteringKeep Lots of Copies; Testing the Track; Data Compression and Streaming; Release Formats; Afterword; CHAPTER 19 Help!…”
Publicado 2002
Libro electrónico -
1729por Shirazi, JackTabla de Contenidos: “…; The Tuning Game; System Limitations and What to Tune; A Tuning Strategy; Perceived Performance; Threading to Appear Quicker; Streaming to Appear Quicker; Caching to Appear Quicker; Starting to Tune; User Agreements; Setting Benchmarks; The Benchmark Harness; Taking Measurements; What to Measure; Don't Tune What You Don't Need to Tune; Performance Checklist…”
Publicado 2007
Libro electrónico -
1730por Lobel, Leonard“…Discover how to: Query complex data with powerful Transact-SQL enhancements Use new, non-relational features: hierarchical tables, native file streaming, and geospatial capabilitiesExploit…”
Publicado 2009
Libro electrónico -
1731Publicado 2008Tabla de Contenidos: “…Playing QuickTime Movies Saving QuickTime Movies from a Web Browser; Configuring and Updating QuickTime; Watching Streaming QuickTime Media; Interacting with QuickTime VR Images; Making a QuickTime Slide Show; Basic QuickTime Movie Editing; Adding a Sound Track to Your Movie; Adding QuickTime Text Tracks; Applying QuickTime Effects; Using iTunes; Using Shared Music Libraries; The iTunes Store; Album Covers and iTunes Views; Front Row; Summary; Part II: At Work with Mac OS X; Chapter 8: Getting Help; Using the Help Viewer Application; Displaying Help Tags; Getting Command-Line Help…”
Libro electrónico -
1732por Sosinsky, Barrie A.“… Everything you need to set up and maintain large or small networks Barrie Sosinsky Networking Bible Create a secure network for home or enterprise Learn basic building blocks and standards Set up for broadcasting, streaming, and more The book you need to succeed! Your A-Z guide to networking essentials Whether you're setting up a global infrastructure or just networking two computers at home, understanding of every part of the process is crucial to the ultimate success of your system. …”
Publicado 2009
Libro electrónico -
1733por Spotted Eagle, DouglasTabla de Contenidos: “…; Print to Tape (PTT); Render to a DV File on the Hard Drive; MPEG-2 Encoding Tips; Render to DVD (MPEG-2); Render for Web Streaming; Archiving Projects; Archiving Format; Chapter 10 Burn a DVD; Making Menus; Modifying Text; Hidden Highlights!…”
Publicado 2005
Libro electrónico -
1734Microsoft Windows 7 administrator's reference upgrading, deploying, managing, and securing Windows 7Publicado 2010Tabla de Contenidos: “…User Profile DataNew Features in Windows 7; Connectivity; BranchCache; DirectAccess; HomeGroup; Internet Explorer 8; Offline Domain Join; VPN Reconnect; Windows Mobility Center; Windows Connect Now; Entertainment; DirectX 11; Gadgets; Games Explorer; Multiplayer Games; Play To; Remote Media Streaming; Windows Media Center; Windows Media Player 12; Performance; 64-bit Computing; Action Center; Audio and Video; Enhanced Driver and Device Support; Power Management; ReadyBoost; Startup Repair; System Restore; Windows Anytime Upgrade; Windows Easy Transfer; Windows Experience Index…”
Libro electrónico -
1735por Lublinsky, BorisTabla de Contenidos: “…Reading Data Your Way with Custom RecordReadersImplementing a Queue-Based RecordReader; Implementing RecordReader for XML Data; Organizing Output Data with Custom Output Formats; Implementing OutputFormat for Splitting MapReduce Job's Output into Multiple Directories; Writing Data Your Way with Custom RecordWriters; Implementing a RecordWriter to Produce Output tar Files; Optimizing Your MapReduce Execution with a Combiner; Controlling Reducer Execution with Partitioners; Implementing a Custom Partitioner for One-to-Many Joins; Using Non-Java Code with Hadoop; Pipes; Hadoop Streaming…”
Publicado 2013
Libro electrónico -
1736Publicado 2015Tabla de Contenidos: “…Description Advantages of Hadoop; Uses of Hadoop; Hadoop ecosystem; Apache Hadoop; Hadoop distributions; Pillars of Hadoop-HDFS, MapReduce, and YARN; Data access components - Hive and Pig; Data storage component - HBase; Data ingestion in Hadoop- Sqoop and Flume; Streaming and real-time analysis - Storm and Spark; Summary; Chapter 2: Hadoop Ecosystem; Traditional systems; Database trend; Hadoop use cases; Hadoop basic data flow; Hadoop integration; The Hadoop ecosystem; Distributed filesystem; HDFS; Distributed programming; NoSQL databases; Apache HBase; Data ingestion; Service Programming…”
Libro electrónico -
1737por Bolt, Steven“…From networking capabilities to chat, voicemail, streaming video and email, the game consoles of today are unrecognizable from complex computer systems. …”
Publicado 2011
Libro electrónico -
1738por Dubrawsky, IdoTabla de Contenidos: “…Virtualization Technologies; Introduction; The Purpose of Virtualization; Benefits of Virtualization; Types of Virtualization; Designing a Virtual Environment; System Virtualization; Management of Virtual Servers; Application Virtualization; Terminal Services (Remote Desktop Services); XenApp; Application Streaming…”
Publicado 2009
Libro electrónico -
1739Publicado 2015Tabla de Contenidos: “…The graphics moduleQuerying delta time; Querying display size; Querying the frames per second (FPS) counter; The audio module; Sound playback; Music streaming; The input module; Reading the keyboard/touch/mouse input; Reading the accelerometer; Starting and canceling vibrator; Catching Android's soft keys; The files module; Getting an internal file handle; Getting an external file handle; The network module; HTTP requests; Client/server sockets; Opening a URI in a web browser; LibGDX's application life cycle and interface; Starter classes; Running the demo application on a desktop…”
Libro electrónico -
1740Publicado 2014Tabla de Contenidos: “…Detecting user input via event listeningManaging multiple listeners at once; Detecting more complex gestures; Introducing the controllers API; Input mapping for cross-platform development; Chapter 5: Audio and File I/O; Introduction; Playing short sound effects; Audio streaming for background music; Optimizing audio files to reduce download sizes; Procedural audio generators; Engine sounds with dynamic audio; The 2D space sound system; The first approach to file handling in Libgdx; Using preferences to store game states and options; The XML parsing primer…”
Libro electrónico