|
|
|
|
|
Learning Bing Maps API
Bing Maps are a great resource and very versatile when you know how. And this book will show you how, covering everything from embedding on a web page to customizing with your own styles and geo-data.
Overview
-
Display address information for any point on the map through the location-based REST services...
| | Algorithms in Java: Parts 1-4, Third EditionSedgewick has a real gift for explaining concepts in a way that makes them easy to understand. The use of real programs in page-size (or less) chunks that can be easily understood is a real plus. The figures, programs, and tables are a significant contribution to the learning experience of the reader; they make this book... | | MIDP 2.0 Style Guide for the Java 2 Platform, Micro EditionMIDP 2.0 Style Guide for the Java(TM) 2 Platform, Micro Edition, is the comprehensive reference for designing and creating interactive Java(TM) applications for consumer-oriented mobile devices. Readers learn how to best exploit MIDP 2.0 features, such as the gaming API, multimedia, and... |
|
Dynamic Speech Models (Synthesis Lectures on Speech and Audio Processing)
In a broad sense, speech dynamics are time-varying or temporal characteristics in all stages
of the human speech communication process. This process, sometimes referred to as speech
chain [1], starts with the formation of a linguistic message in the speaker’s brain and ends with
the arrival of the message in the... | | Suse Linux Integration Guide for IBM Elogo Server Xseries and NetfinityThis redbook will help you install, tailor and configure the SuSE Linux 7.0 distribution on different servers of the xSeries and Netfinity class. You will be instructed on how to do the basic installation, and installing and configuring different services such as Apache (http-Server), Samba (Fileserver for Windows-based networks), and Postfix (an... | | Hacking Exposed Cisco NetworksImplement bulletproof Cisco security the battle-tested Hacking Exposed way
Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised... |
|
Mastering Modern Web Penetration Testing
Key Features
-
This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
-
Penetrate and secure your web application using various techniques
-
Get this comprehensive
... | | | | Beginning Android 4 (Beginning Apress)
Android is everywhere. Phones. Tablets. TVs and set-top boxes powered by Google TV. Soon, Android will be in cars, in in-flight entertainment systems on planes, and even in
robots!
However, the general theme of Android devices will be smaller screens and/or no
hardware keyboard. And, by the numbers, Android ... |
|
|
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 |