 |
|
 Microservices: Flexible Software Architecture
The Most Complete, Practical, and Actionable Guide to Microservices
Going beyond mere theory and marketing hype, Eberhard Wolff presents all the knowledge you need to capture the full benefits of this emerging paradigm. He illuminates... |  |  |  |  Unity 4.x Cookbook
Maximize the potential of Unity 4 with this wide-ranging book. Your games will look better, play more realistically, and communicate with more devices through applying these fully explanatory recipes.
Overview
-
A wide range of topics are covered, ranging in complexity, offering something for every Unity 4...
|
|
 |  |  |  |  Governance, Risk, and Compliance Handbook for Oracle Applications
-
Governance: In depth coverage of corporate, IT, and security Governance, which includes important topics such as strategy development and communication, strategic reporting and control, and more
-
Risk Management: Creating a risk management program, performing risk assessment and control verification, and more
... |
|
 Learning Analytics in R with SNA, LSA, and MPIA
This book introduces Meaningful Purposive Interaction Analysis (MPIA) theory, which combines social network analysis (SNA) with latent semantic analysis (LSA) to help create and analyse a meaningful learning landscape from the digital traces left by a learning community in the co-construction of knowledge.
... |  |  Xamarin Mobile Development for Android Cookbook
Over 80 hands-on recipes to unleash full potential for Xamarin in development and monetization of feature-packed, real-world Android apps
About This Book
-
Create a number of Android applications using the Xamarin Android platform
-
Extensively integrate your Android devices with other...
|  |  Conducting Network Penetration and Espionage in a Global Environment
When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networksâusing free, open... |
|
 Android Recipes: A Problem-Solution Approach
Discover more than 100 down-to-earth code recipes, covering a wide range of useful topics using complete and real-world working code examples. This book is updated to include the Android N SDK (7.0), as well as earlier releases.
Crammed with insightful instruction and helpful examples, this fifth edition of Android Recipes... |  |  Thai Stick: Surfers, Scammers, and the Untold Story of the Marijuana Trade
Located on the left bank of the Chao Phya River, Thailand's capital, Krungthep, known as Bangkok to Westerners and "the City of Angels" to Thais, has been home to smugglers and adventurers since the late eighteenth century. During the 1970s, it became a modern Casablanca to a new generation of treasure seekers, from surfers... |  |  The Making of Prince of Persia: Journals 1985 - 1993
Before Prince of Persia was a best-selling video game franchise and a Jerry Bruckheimer movie, it was an Apple II computer game created and programmed by one person, Jordan Mechner. Also available as an ebook, Mechner’s candid journals from the time capture his journey from his parents’ basement to the forefront of the... |
|
| Result Page: 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 |