Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Know how to set up, defend, and attack computer networks with this revised and expanded second edition.
You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more...
The Nature of Code: Simulating Natural Systems with Processing
How can we capture the unpredictable evolutionary and emergent properties of nature in software? How can understanding the mathematical principles behind our physical world help us to create digital worlds? This book focuses on a range of programming strategies and techniques behind computer simulations of natural systems, from elementary... Mastering Ext JS
Build an application with Ext JS from scratch
Learn expert tips and...
HTML5: Up and Running
If you don't know about the new features available in HTML5, now's the time to find out. The latest version of this markup language is going to significantly change the way you develop web applications, and this book provides your first real look at HTML5's new elements and attributes.
Even though work on...
Instant HTML5 2D Platformer
Learn how to develop a 2D HTML5 platformer that is capable of running in modern browsers
Learn something new in an Instant! A short, fast, focused guide delivering immediate results
Learn about HTML5 2D game development and how to create your own HTML5 games...
API Design for C++
Writing large applications in C++ is a complex and tricky business. However, designing reusable C++
interfaces that are robust, stable, easy to use, and durable is even more difficult. The best way to succeed
in this endeavor is to adhere to the tenets of good Application Programming Interface (API)
An API presents a...
Identity and Data Security for Web Development: Best Practices
Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how...
|Result Page: 76 75 74 73 72 71 70 69 68 67 |