Home | Amazing | Today | Tags | Publishers | Years | Search 
Building Node Applications with MongoDB and Backbone
Building Node Applications with MongoDB and Backbone

Build an application from backend to browser with Node.js, and kick open the doors to real-time event programming. With this hands-on book, you’ll learn how to create a social network application similar to LinkedIn and Facebook, but with a real-time twist. And you’ll build it with just one programming language:...

Decompiling Android
Decompiling Android

Decompiling Android looks at the the reason why Android apps can be decompiled to recover their source code, what it means to Android developers and how you can protect your code from prying eyes. This is also a good way to see how good and bad Android apps are constructed and how to learn from them in building your own apps.

...
Using Technology to Sell: Tactics to Ratchet Up Results
Using Technology to Sell: Tactics to Ratchet Up Results

"Using Technology to Sell is filled with practical, effective techniques to sell more by leveraging the plethora of tools and information in today’s world. By applying these principles, you'll open more doors, increase your productivity, speed up decisions, and close more deals."

...

Beginning COBOL for Programmers
Beginning COBOL for Programmers

Beginning COBOL for Programmers is a comprehensive, sophisticated tutorial and modular skills reference on the COBOL programming language for established programmers. This book is for you if you are a developer who would like to—or must—add COBOL to your repertoire. Perhaps you recognize the opportunities presented by the...

Introduction to Topology and Geometry
Introduction to Topology and Geometry

An easily accessible introduction to over threecenturies of innovations in geometry

Praise for the First Edition

...a welcome alternative to compartmentalizedtreatments bound to the old thinking. This clearly written,well-illustrated book supplies sufficient background to beself-contained. CHOICE

This fully...

The Inmates Are Running the Asylum : Why High Tech Products Drive Us Crazy and How to Restore the Sanity (2nd Edition)
The Inmates Are Running the Asylum : Why High Tech Products Drive Us Crazy and How to Restore the Sanity (2nd Edition)
The Inmates are Running the Asylum argues that, despite appearances, business executives are simply not the ones in control of the high-tech industry. They have inadvertently put programmers and engineers in charge, leading to products and processes that waste huge amounts of money, squander customer loyalty, and erode competitive advantage. They...
Direct3D ShaderX: Vertex and Pixel Shader Tips and Tricks with CDROM
Direct3D ShaderX: Vertex and Pixel Shader Tips and Tricks with CDROM
Vertex and pixel shader programming allows graphics and game developers to create photorealistic graphics on the personal computer for the first time. And with DirectX, programmers have access to an assembly language interface to the transformation and lighting hardware (vertex shaders) and the pixel pipeline (pixel shaders). Direct3D ShaderX...
Careers in Computers, Third Edition
Careers in Computers, Third Edition
Need a job? Use the Net. Monster.com offers a resume builder, posting feature,
and hundreds of thousands of job opportunities online. The Internet has made
volumes of valuable, up-to-date information on any subject available to both
individuals and organizations. Requiring only a personal computer and modem,
an individual can
...
Linux (Hacking Exposed)
Linux (Hacking Exposed)

From the publisher who brought you the international best-seller, Hacking Exposed: Network Security Secrets & Solutions...

Learn how to think like a hacker in order to secure your Linux network

In the ever-changing world of global data communications, inexpensive Internet connections, and fast-paced software...

Mission Critical Internet Security
Mission Critical Internet Security
The best security for a network segment is isolation, but that's not an option if you want your users to enjoy Internet connectivity. Mission Critical Internet Security explores your options for protecting your network from attack across the Internet, emphasizing firewall solutions from Cisco, Symantec, Microsoft, and Check Point. This...
Cyber Adversary Characterization: Auditing the Hacker Mind
Cyber Adversary Characterization: Auditing the Hacker Mind
A book about hacking is a book about everything.
First, the meaning of hacker.

The word “hacker” emerged in an engineering context and became popular
at The Massachusetts Institute of Technology (MIT), among other places, as a
way to talk about any ingenious, creative, or unconventional use of a machine...
The Secure Online Business Handbook: E-Commerce, IT Functionality and Business Continuity
The Secure Online Business Handbook: E-Commerce, IT Functionality and Business Continuity
For many organizations their dependence on information systems, both within the company
and networked up and down their supply chain, is now business critical. Any sustained loss
of availability of these systems would threaten the very existence of the business.

Security is a holistic issue. Vulnerabilities in physical,
...
Result Page: 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy