Home | Amazing | Today | Tags | Publishers | Years | Search 
Digital Privacy and Security Using Windows: A Practical Guide
Digital Privacy and Security Using Windows: A Practical Guide

Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques.

This book teaches you how to secure your online identity and personal...

Color Atlas of Infective Endocarditis
Color Atlas of Infective Endocarditis
Infective endocarditis is a life-threatening diseasewith substantial morbidity and mortality (20% or more) despite improved techniques to aid diagnosis and modern antibiotics and surgical therapies. It affects individuals with underlying structural cardiac defects who develop bacteremia, often as a result of dental,...
Mastering Social Media Mining with R
Mastering Social Media Mining with R

Extract valuable data from your social media sites and make better business decisions using R

About This Book

  • Explore the social media APIs in R to capture data and tame it
  • Employ the machine learning capabilities of R to gain optimal business value
  • A hands-on guide with...
Corona SDK Mobile Game Development Beginners Guide - Second Edition
Corona SDK Mobile Game Development Beginners Guide - Second Edition

Learn, explore, and create commercially successful mobile games for iOS and Android

About This Book

  • From game physics to successful marketing, learn the fundamentals of Corona SDK for game development
  • Integrate your games with social networks such as Twitter and Facebook
  • ...
Managing Trust in Cyberspace
Managing Trust in Cyberspace

In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis...

Learning iOS Security
Learning iOS Security

Enhance the security of your iOS platform and applications using iOS-centric security techniques

About This Book

  • Familiarize yourself with fundamental methods to leverage the security of iOS platforms and apps
  • Resolve common vulnerabilities and security-related shortcomings in iOS...
Microsoft Mapping Second Edition: Geospatial Development in Windows 10 with Bing Maps and C#
Microsoft Mapping Second Edition: Geospatial Development in Windows 10 with Bing Maps and C#

This 200 page revised edition of Microsoft Mapping includes the latest details about SQL Server 2014 and the new 3D and Streetside-capable map control for Windows 10 applications. It contains updated chapters on Microsoft Azure and Power Map for Excel plus a new chapter on Bing Maps for Universal Windows. The book tells a story, from...

Computational Red Teaming: Risk Analytics of Big-Data-to-Decisions Intelligent Systems
Computational Red Teaming: Risk Analytics of Big-Data-to-Decisions Intelligent Systems

Written to bridge the information needs of management and computational scientists, this book presents the first comprehensive treatment of Computational Red Teaming (CRT).  The author describes an analytics environment that blends human reasoning and computational modeling to design risk-aware and evidence-based smart decision making...

Hyper-V for VMware Administrators: Migration, Coexistence, and Management
Hyper-V for VMware Administrators: Migration, Coexistence, and Management

Learn to deploy and support Hyper-V, building on what you know about VMware's vSphere. Whether you're looking to run both hypervisors in parallel or migrate completely, Hyper-V for VMware Administrators has everything you need to get started.

The book begins with an overview of Hyper-V basics, including common...

CSS Floating: Floats and Float Shapes
CSS Floating: Floats and Float Shapes

While flowing text around images is certainly nothing new, with CSS you can float any element, from images to paragraphs to lists. In this practical guide, author Eric Meyer reveals some interesting—and surprising—ways to use CSS floats in your web design, including the latest capability to flow content past...

Android Application Security Essentials
Android Application Security Essentials

Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments.

Overview

  • Understand Android security from kernel to the application layer
  • Protect...
iOS Development with Xamarin Cookbook - More than 100 Recipes, Solutions, and Strategies for Simpler iOS Development
iOS Development with Xamarin Cookbook - More than 100 Recipes, Solutions, and Strategies for Simpler iOS Development

Key Features

  • Explore the new features of Xamarin and learn how to use them
  • Step-by-step recipes give you everything you need to get developing with Xamarin
  • Full of useful tips and best practices on creating iOS applications

Book Description

This book will...

Result Page: 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy