 |
|
 Android Programming: Pushing the Limits
Unleash the power of the Android OS and build the kinds ofbrilliant, innovative apps users love to use
If you already know your way around the Android OS and can builda simple Android app in under an hour, this book is for you. Ifyou’re itching to see just how far you can push it anddiscover what Android is really... |  |  |  |  Blockchain Basics: A Non-Technical Introduction in 25 Steps
In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through pictures, analogies, and metaphors.
This book... |
|
|
 |  |  Android Application Security Essentials
Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments.
Overview
-
Understand Android security from kernel to the application layer
-
Protect...
|  |  Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings (Lecture Notes in Computer Science)
This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013. The 28 revised full papers presented were carefully selected from 78 submissions. Conference papers are organized in technical sessions, covering topics of... |
|
|
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 |