Home | Amazing | Today | Tags | Publishers | Years | Search 
JavaScript Projects for Kids
JavaScript Projects for Kids

Key Features

  • Get to know the concepts of HTML and CSS to work with JavaScript
  • Explore the concepts of object-oriented programming
  • Follow this step-by-step guide on the fundamentals of JavaScript programming

Book Description

JavaScript is the most widely-used...

CoffeeScript in Action
CoffeeScript in Action

Summary

CoffeeScript in Action is a tutorial that teaches you how, where, and why to use CoffeeScript. It begins by quickly exposing you to CoffeeScript's new, but instantly-familiar syntax. Then, you'll explore programming challenges that illustrate CoffeeScript's unique advantages. Language...

Develop on Yammer: Social Integration for Modern Business Applications
Develop on Yammer: Social Integration for Modern Business Applications

Develop on Yammer is your guide to integrating the Yammer social network with your company’s application ecosystem. By developing custom apps and features on the Yammer platform, you can make your workplace more productive, encourage communication and feedback, and get your colleagues collaborating across a range of platforms,...

Microsoft Exchange Server 2013 PowerShell Cookbook: Second Edition
Microsoft Exchange Server 2013 PowerShell Cookbook: Second Edition

Benefit from over 120 recipes that tackle the everyday issues that arise with Microsoft Exchange Server. Using PowerShell you'll learn to add scripts that provide new functions and efficiencies. Only basic knowledge required.

Overview

  • Newly updated and improved for Exchange Server 2013 and PowerShell...
Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)
Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)

## ## ## The Ultimate Guide to the 17 Most Dangerous Hacking Attacks ## ## ##

Do you want to learn about today's most sophisticated Hacking attacks?

Do you want to know more about Cyber criminals and their operations?

Do you want to learn about Robot Networks, Trojans &
...

Electronics Cookbook: Practical Electronic Recipes with Arduino and Raspberry Pi
Electronics Cookbook: Practical Electronic Recipes with Arduino and Raspberry Pi

If you’re among the many hobbyists and designers who came to electronics through Arduino and Raspberry Pi, this cookbook will help you learn and apply the basics of electrical engineering without the need for an EE degree. Through a series of practical recipes, you’ll learn how to solve specific problems while diving into...

Mastering Docker
Mastering Docker

Rethink what's possible with Docker – become an expert in the innovative containerization tool to unlock new opportunities in the way you use and deploy software

About This Book

  • Create highly scalable applications and services using the Linux container virtualization paradigm
  • ...
Fodor's South Florida: with Miami, Fort Lauderdale & the Keys (Full-color Travel Guide)
Fodor's South Florida: with Miami, Fort Lauderdale & the Keys (Full-color Travel Guide)

Written by locals, Fodor's travel guides have been offering expert advice for all tastes and budgets for more than 80 years. 

With many of the state's most popular destinations, including Miami, Palm Beach, Fort Lauderdale, the Everglades, and the Florida Keys, South Florida is a vacation destination rich in
...

OCA / OCP Java SE 8 Programmer Practice Tests
OCA / OCP Java SE 8 Programmer Practice Tests

Test your knowledge and prepare for the OCA/OCP exams

OCA/OCP Java SE 8 Programmer Practice Tests complements the Sybex OCA: Oracle Certified Associate Java SE 8 Programmer I Certification Study Guide and the OCP: Oracle Certified Professional Java SE 8 Programmer II Study Guide for exams 1Z0-808 and...

Understanding Network Hacks: Attack and Defense with Python
Understanding Network Hacks: Attack and Defense with Python

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore...

Unity UI Cookbook
Unity UI Cookbook

Key Features

  • Design and develop interactive and professional user interfaces (UIs) for games in Unity
  • Discover how to implement and deal with various in-game UI elements that will impress your players
  • This practical recipe guide will help you to efficiently create powerful and remarkable UIs...
Unity Virtual Reality Projects: Explore the world of virtual reality by building immersive and fun VR projects using Unity 3D
Unity Virtual Reality Projects: Explore the world of virtual reality by building immersive and fun VR projects using Unity 3D

Explore the world of Virtual Reality by building immersive and fun VR projects using Unity 3D

Key Features

  • Learn the basic principles of virtual reality applications and get to know how they differ from games and desktop apps
  • Build various types of VR experiences, including diorama,...
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy