|
|
|
|
Beginning iOS 7 Development: Exploring the iOS SDK
The team that brought you the bestselling Beginning iPhone Development is back again for Beginning iOS 7 Development, bringing this definitive guide up-to-date with Apple's latest and greatest iOS 7 SDK, as well as with the latest version of Xcode.
There’s coverage of brand-new technologies, including a... | | Game Programming Using QT
A complete guide to designing and building fun games with Qt and Qt Quick 2 using associated toolsets
About This Book
-
Learn to create simple 2D to complex 3D graphics and games using all possible tools and widgets available for game development in Qt
-
Understand technologies such as QML,...
| | Inside Microsoft Windows 2000, Third EditionThe third edition of Inside Microsoft Windows 2000 is intended for advanced computer professionals (both developers and system administrators) who want to understand how the core components of the Microsoft Windows 2000 operating system work internally. With this knowledge, developers can better comprehend the rationale behind... |
|
|
Security Sage's Guide to Hardening the Network InfrastructureWith the proliferation of wireless access points (WAPs), virtual private networks (VPNs), and extranets, it’s becoming increasingly difficult to determine where your network begins and ends. Add this complexity to common economic factors, such as company mergers and acquisitions, and now you have a tangled web of... | | Dynamic HTML: The Definitive ReferenceDanny Goodman felt that he couldn't trust any of the documentation on Dynamic HTML (DHTML) that he read (too many contradictions), so he wrote this book as a reference for working with his own clients. After testing tags and techniques on multiple releases of the main browsers, Goodman came up with very practical information--some of which you may... | | |
|
| | | | The Mac Hacker's HandbookAs more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat... |
|
|
Result Page: 246 245 244 243 242 241 240 239 238 237 236 235 234 233 232 231 230 229 228 |