Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireless Programming with J2ME: Cracking the Code (With CD-ROM)
Wireless Programming with J2ME: Cracking the Code (With CD-ROM)
Part of the new Cracking the Code Series, Wireless Programming with J2ME provides a look at the code behind wireless Java applications.

Think of J2ME as a tiny version of Java specifically for mobile devices -- perfect for bringing powerful, robust applications to mobile phone, pagers, PDAs, and other handhelds. Writing applications...

Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks

Know how to set up, defend, and attack computer networks with this revised and expanded second edition.

You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more...

Windows Presentation Foundation Unleashed (WPF)
Windows Presentation Foundation Unleashed (WPF)
Thank you for picking up Windows Presentation Foundation Unleashed! To avoid unsatisfied customers, I want to clarify that this is not a book about Microsoft PowerPoint (which many people consider to be the foundation of Windows presentations)! Windows Presentation Foundation (WPF) is Microsoft’s latest technology for creating graphical user...
iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets
iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets
"This book is a must for anyone attempting to examine the iPhone. The level of forensic detail is excellent. If only all guides to forensics were written with this clarity!" -Andrew Sheldon, Director of Evidence Talks, computer forensics experts With iPhone use increasing in business networks, IT and security professionals face a serious...
Python Hacking Essentials
Python Hacking Essentials

Target Audience

  • This book is not for professional hackers. Instead, this book is made for beginners who have programming experience and are interested in hacking. Here, hacking techniques that can be easily understood have been described. If you only have a home PC, you can test all the examples provided here. I...
Cracking the Coding Interview: 150 Programming Questions and Solutions
Cracking the Coding Interview: 150 Programming Questions and Solutions

Now in the 5th edition, Cracking the Coding Interview gives you the interview preparation you need to get the top software developer jobs. This is a deeply technical book and focuses on the software engineering skills to ace your interview. The book is over 500 pages and includes 150 programming interview questions and answers, as well...

Corrosion Mechanisms in Theory and Practice (Corrosion Technology)
Corrosion Mechanisms in Theory and Practice (Corrosion Technology)
Corrosion is a major issue for the increase of service life and reliability of metallic materials. A detailed understanding of the mechanisms of corrosion helps us to solve existing corrosion problems and to prevent future problems.

The aim of this book is to review recent advances in the understanding of corrosion and protection
...
Computer Security Fundamentals (2nd Edition)
Computer Security Fundamentals (2nd Edition)

It has been more than 6 years since the publication of the original edition of this book. A great deal has happened in the world of computer security since that time. This edition is updated to include newer information, updated issues, and revised content.

The real question is who is this book for. This book is...

Cracking Windows Phone and BlackBerry Native Development: Cross-Platform Mobile Apps Without the Kludge
Cracking Windows Phone and BlackBerry Native Development: Cross-Platform Mobile Apps Without the Kludge
For me, this book has become all about change. In the time that I have been watching the mobile computing marketplace and developing software solutions for it, there has never been a time when there has been a more rapid series of shifts and changes. A good friend of mine tells me that this is because of market consolidation. As of...
Linux (Hacking Exposed)
Linux (Hacking Exposed)

From the publisher who brought you the international best-seller, Hacking Exposed: Network Security Secrets & Solutions...

Learn how to think like a hacker in order to secure your Linux network

In the ever-changing world of global data communications, inexpensive Internet connections, and fast-paced software...

  
unlimited object storage image
Result Page: 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy