Home | Amazing | Today | Tags | Publishers | Years | Search 
Mobile and Wireless Network Security and Privacy
Mobile and Wireless Network Security and Privacy

Currently the mobile wireless technology is experiencing rapid growth. However the major challenge for deployment of this technology with its special characteristics is securing the existing and future vulnerabilities. Major security and privacy issues for standard wireless networks include the authentication of wireless clients and...

SolidWorks 2011 Parts Bible
SolidWorks 2011 Parts Bible

SolidWorks as a topic of learning is a huge, sprawling expanse. There is a lot to know, and a lot to write about. While I have made every effort to be complete in this book, I'm sure there are some niche topics that have gone untreated. New in 2011, I have taken this book from a single volume of an immense scope to two individual volumes,...

Compilers: Principles, Techniques, and Tools (2nd Edition)
Compilers: Principles, Techniques, and Tools (2nd Edition)

In the time since the 1986 edition of this book, the world of compiler design has changed significantly. Programming languages have evolved to present new compilation problems. Computer architectures offer a variety of resources of which the compiler designer must take advantage. Perhaps most interestingly, the venerable technology of...

Clojure in Action
Clojure in Action

I can tell you how much I enjoy being a geek. I can tell you how fascinated I was with the punch-cards my dad showed me back in 1985. I can tell you how I got my first computer when I was seven. And I can tell you that I’ve loved programming since 1989. I can tell you a great many things about all that, but I’m not sure how...

MySQL Troubleshooting: What To Do When Queries Don't Work
MySQL Troubleshooting: What To Do When Queries Don't Work

I have worked since May 2006 as a principal technical support engineer in the Bugs Verification Group of the MySQL Support Group for MySQL AB, then Sun, and finally Oracle. During my daily job, I often see users who are stuck with a problem and have no idea what to do next. Well-verified methods exist to find the cause of the problem...

OS X and iOS Kernel Programming
OS X and iOS Kernel Programming
Kernel development can be a daunting task and is very different from programming traditional user applications. The kernel environment is more volatile and complex. Extraordinary care must be taken to ensure that kernel code is free of bugs because any issue may have serious consequences to the stability, security, and performance...
Software and Systems Traceability
Software and Systems Traceability
Software engineering is a pessimistic discipline. The glass is always half empty rather than half full. Not surprising really, we are hardened to the grind of improving quality, painstakingly testing and, never quite, eliminating bugs. Critical review is of the essence. We know there is “no silver bullet”.

...
Introducing HTML5 (2nd Edition)
Introducing HTML5 (2nd Edition)

Welcome to the second edition of the Remy & Bruce show. Since the first edition of this book came out in July 2010, much has changed: support for HTML5 is much more widespread; Internet Explorer 9 finally came out; Google Chrome announced it would drop support for H.264 video; Opera experimented with video streaming...

Pro Python Best Practices: Debugging, Testing and Maintenance
Pro Python Best Practices: Debugging, Testing and Maintenance

Learn software engineering and coding best practices to write Python code right and error free. In this book you’ll see how to properly debug, organize, test, and maintain your code, all of which leads to better, more efficient coding.

Software engineering is difficult. Programs of any substantial length are...

iOS Penetration Testing: A Definitive Guide to iOS Security
iOS Penetration Testing: A Definitive Guide to iOS Security
Unearth some of the most significant attacks threatening iOS applications in recent times and learn methods of patching them to make payment transactions and personal data sharing more secure. 

When it comes to security, iOS has been in the spotlight for a variety of reasons. Although a tough system to
...
Remote Pairing: Collaborative Tools for Distributed Development
Remote Pairing: Collaborative Tools for Distributed Development

You've heard about pair programming's benefits: fewer bugs, improved skills, and faster delivery. But what happens when you want to pair with someone in another city, country, or even hemisphere? With the right tools, you won't have to relocate to refactor. In this book, you'll learn techniques used by the most productive...

Object-Oriented Design with ABAP: A Practical Approach
Object-Oriented Design with ABAP: A Practical Approach

Conquer your fear and anxiety learning how the concepts behind object-oriented design apply to the ABAP programming environment.  Through simple examples and metaphors this book demystifies the object-oriented programming model.

Object-Oriented Design with ABAP presents a bridge from the familiar procedural style...
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy