 |
|
|
 Create Mobile Games with Corona: Build with Lua on iOS and Android
Printed in full color.
Develop cross-platform mobile games with Corona using the Lua programming language! Corona is experiencing explosive growth among mobile game developers, and this book gets you up to speed on how to use this versatile platform. You'll use the Corona SDK to simplify game programming and take a... |  |  Learning Geospatial Analysis with Python - Second Edition
An effective guide to geographic information systems and remote sensing analysis using Python 3
About This Book
-
Construct applications for GIS development by exploiting Python
-
This focuses on built-in Python modules and libraries compatible with the Python Packaging Index distribution...
|  |  Learning Geospatial Analysis with Python
If you know Python and would like to use it for Geospatial Analysis this book is exactly what you've been looking for. With an organized, user-friendly approach it covers all the bases to give you the necessary skills and know-how.
Overview
-
Construct applications for GIS development by exploiting...
|
|
 Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)
The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,... |  |  PRINCE2 Study Guide: 2017 Update
Everything you need to pass the PRINCE2 with flying colors
The PRINCE2 Study Guide, Second Edition, offers comprehensive preparation for the latest PRINCE2 exam. Covering 100 percent of the exam objectives, this guide provides invaluable guidance that will help you master both the material and its applications;... |  |  Hacking Exposed 7: Network Security Secrets and Solutions
The latest tactics for thwarting digital attacks
“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the... |
|
|
Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 |