 |
|
 Building Node Applications with MongoDB and Backbone
Build an application from backend to browser with Node.js, and kick open the doors to real-time event programming. With this hands-on book, you’ll learn how to create a social network application similar to LinkedIn and Facebook, but with a real-time twist. And you’ll build it with just one programming language:... |  |  Decompiling Android
Decompiling Android looks at the the reason why Android apps can be decompiled to recover their source code, what it means to Android developers and how you can protect your code from prying eyes. This is also a good way to see how good and bad Android apps are constructed and how to learn from them in building your own apps. ... |  |  Using Technology to Sell: Tactics to Ratchet Up Results
"Using Technology to Sell is filled with practical, effective techniques to sell more by leveraging the plethora of tools and information in today’s world. By applying these principles, you'll open more doors, increase your productivity, speed up decisions, and close more deals."
... |
|
 Beginning COBOL for Programmers
Beginning COBOL for Programmers is a comprehensive, sophisticated tutorial and modular skills reference on the COBOL programming language for established programmers. This book is for you if you are a developer who would like to—or must—add COBOL to your repertoire. Perhaps you recognize the opportunities presented by the... |  |  Introduction to Topology and Geometry
An easily accessible introduction to over threecenturies of innovations in geometry
Praise for the First Edition
...a welcome alternative to compartmentalizedtreatments bound to the old thinking. This clearly written,well-illustrated book supplies sufficient background to beself-contained. CHOICE
This fully... |  |  |
|
|
 Mission Critical Internet SecurityThe best security for a network segment is isolation, but that's not an option if you want your users to enjoy Internet connectivity. Mission Critical Internet Security explores your options for protecting your network from attack across the Internet, emphasizing firewall solutions from Cisco, Symantec, Microsoft, and Check Point. This... |  |  Cyber Adversary Characterization: Auditing the Hacker MindA book about hacking is a book about everything. First, the meaning of hacker.
The word “hacker” emerged in an engineering context and became popular at The Massachusetts Institute of Technology (MIT), among other places, as a way to talk about any ingenious, creative, or unconventional use of a machine ... |  |  |
|
Result Page: 7 6 5 4 3 2 1 |