Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Java by Building Android Games: Learn Java and Android from scratch by building six exciting games, 2nd Edition
Learning Java by Building Android Games: Learn Java and Android from scratch by building six exciting games, 2nd Edition

Develop engaging games for the Android platform with Java

Key Features

  • Learn Java, Android, and object-oriented programming from scratch
  • Build games including Sub Hunter, Retro Pong, and Bullet Hell
  • Create and design your own games, such as an open-world...
Guide to Tactical Perimeter Defense
Guide to Tactical Perimeter Defense

This course is the official courseware for the Security Certified Program SC0-451 certification exam. The Tactical Perimeter Defense course is designed to provide network administrators and certification candidates with hands-on tasks on the most fundamental perimeter security technologies. The network perimeter is often the first...

Counterfeit Integrated Circuits: Detection and Avoidance
Counterfeit Integrated Circuits: Detection and Avoidance

This timely and exhaustive study offers a much-needed examination of the scope and consequences of the electronic counterfeit trade.  The authors describe a variety of shortcomings and vulnerabilities in the electronic component supply chain, which can result in counterfeit integrated circuits (ICs).  Not only does this book provide...

Programmer's Ultimate Security DeskRef
Programmer's Ultimate Security DeskRef
The Programmer's Ultimate Security DeskRef is the only complete desk reference covering multiple languages and their inherent security issues. It will serve as the programming encyclopedia for almost every major language in use. While there are many books starting to address the broad subject of security best practices within the software...
Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
This book constitutes the refereed proceedings of the 7th International Workshop on Information Security Applications, WISA 2006, held in Jeju Island, Korea in August 2006.

The 30 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 146 submissions. The papers are organized in topical...

CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide
CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide

Official self-study test preparation guide for the Cisco 9E0-111 and 642-521 CSPFA exams

Coverage of the CSPFA topics enables you to identify and fill your knowledge gaps before the exam date. You'll learn about:

  • The comprehensive line of Cisco PIX Firewall products and the technology and features central to each...
Credibility Assessment: Scientific Research and Applications
Credibility Assessment: Scientific Research and Applications

In 2001, the late Murray Kleiner and an array of experts contributed to the Handbook of Polygraph Testing, published by Elsevier, which examined the fundamental principles behind polygraph tests and reviewed the key tests and methods used at that time. In the intervening thirteen years, the field has moved beyond traditional polygraph...

Chipless RFID: Design Procedure and Detection Techniques
Chipless RFID: Design Procedure and Detection Techniques

This book examines the design of chipless RFID systems. The authors begin with the philosophy of RFID and its effect on commercial applications. Then, they discuss the chipless RFID systems and the application of chipless RFID systems, the advantages it provides compared to conventional barcode ID and chipped RFID tags. The text then covers...

Introduction to Fluorescence Sensing
Introduction to Fluorescence Sensing
Fluorescence sensing is a rapidly developing field of research and technology. Its target is nearly the whole world of natural and synthetic compounds being detected in different media including living bodies. The application area range from control of industrial processes to environment monitoring and clinical diagnostics. Among different...
Ultrawideband Radar: Applications and Design
Ultrawideband Radar: Applications and Design

Providing a practical review of the latest technology in the field, Ultrawideband Radar Applications and Design presents cutting-edge advances in theory, design, and practical applications of ultrawideband (UWB) radar. This book features contributions from an international team of experts to help readers learn about a wide range...

Green, Pervasive, and Cloud Computing: 13th International Conference, GPC 2018, Hangzhou, China, May 11-13, 2018, Revised Selected Papers (Lecture Notes in Computer Science (11204))
Green, Pervasive, and Cloud Computing: 13th International Conference, GPC 2018, Hangzhou, China, May 11-13, 2018, Revised Selected Papers (Lecture Notes in Computer Science (11204))
This book constitutes the proceedings of the 13th International Conference on Green, Pervasive, and Cloud Computing, GPC 2018, held in Hangzhou, China, in May 2018.

The 35 full papers included in this volume were carefully reviewed and selected from 101 initial submissions. They are organized in the following
...
CIW: Security Professional Study Guide Exam 1D0-470 (With CD-ROM)
CIW: Security Professional Study Guide Exam 1D0-470 (With CD-ROM)

Here’s the book you need to prepare for Exam 1D0-470, CIW Security Professional. This Study Guide provides:

  • In-depth coverage of official exam objectives
  • Practical information on security concepts and practices
  • Hundreds of...
unlimited object storage image
Result Page: 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy