Home | Amazing | Today | Tags | Publishers | Years | Search 
Backbone.js Blueprints
Backbone.js Blueprints

Everything you need to know about building front end apps in Backbone.js is contained in this book. Packed with projects, code, and sound explanations, it’s the essential guide to this indispensable JavaScript library.

Overview

  • Gain insights into the inner working of Backbone to leverage it...
Learn iOS 7 App Development
Learn iOS 7 App Development

Learn iOS App Development is both a rapid tutorial and a useful reference. You'll quickly get up to speed with Objective-C, Cocoa Touch, and the iOS 7 SDK. It's an all-in-one getting started guide to building your first iPhone or iPad app. You'll learn best practices that ensure your code will be efficient and...

Implementing Samba 4
Implementing Samba 4

Exploit the real power of Samba 4 Server by leveraging the benefits of an Active Directory Domain Controller

Overview

  • Understand the different roles that Samba 4 Server can play on the network
  • Implement Samba 4 as an Active Directory Domain Controller
  • Step-by-step and...
Kali Linux Social Engineering
Kali Linux Social Engineering

Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux

Overview

  • Learn about various attacks and tips and tricks to avoid them
  • Get a grip on efficient ways to perform penetration testing.
  • Use advanced techniques to bypass...
Introducing Java EE 7: A Look at What's New
Introducing Java EE 7: A Look at What's New

Introducing Java EE 7:  A Look at What’s New guides you through the new features and enhancements in each of the technologies comprising the Java EE platform.  Readers of this book will not have to wade through introductory material or information covering features that have been part of the EE platform for...

Iris Biometric Model for Secured Network Access
Iris Biometric Model for Secured Network Access

In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems.

Iris Biometric Model for Secured Network Access proposes a
...

Digital Control
Digital Control

Digital control systems are becoming increasingly prevalent and important within industry. In recent years significant progress has been made in their analysis and design – particularly within the areas of microprocessors and digital signal processors. The traditional approach to teaching digital control assumes an understanding of...

Trade the Trader: Know Your Competition and Find Your Edge for Profitable Trading
Trade the Trader: Know Your Competition and Find Your Edge for Profitable Trading

When you trade, you're not just trading companies that deliver goods or services. You're trading against other traders who care about only one thing: taking your money. That's the #1 hard reality of trading - and most traders either don't know it, or don't act as if they do. In this book,...

Anywhere: How Global Connectivity is Revolutionizing the Way We Do Business
Anywhere: How Global Connectivity is Revolutionizing the Way We Do Business

Is your business prepared for the world of ANYWHERE?

“Companies are beginning to conceive, design, develop, and distribute products and services in profoundly new ways…But how to exploit this new connectivity? Read on.”
—From the Foreword by Don Tapscott, bestselling author of Grown Up
...

The Design of Everyday Things: Revised and Expanded Edition
The Design of Everyday Things: Revised and Expanded Edition
Even the smartest among us can feel inept as we fail to figure out which light switch or oven burner to turn on, or whether to push, pull, or slide a door. The fault, argues this ingenious—even liberating—book, lies not in ourselves, but in product design that ignores the needs of users and the principles of cognitive...
WebGL Game Development
WebGL Game Development

WebGL is the standard for rendering 3D graphics in a browser using JavaScript. This book will teach you to exploit the full potential of WebGL in game development by rendering complex 3D objects. The essential tutorial.

Overview

  • Load and render complex 3D objects in WebGL using JavaScript
  • ...
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and...

Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy