 |
|
|
 Xamarin Studio for Android Programming: A C# Cookbook
Over 50 hands-on recipes to help you get grips with Xamarin Studio and C# programming to develop market-ready Android applications
About This Book
-
Create Android applications with C# and Xamarin
-
Reuse your Android application to develop iOS and Windows Phone applications
- ...
|  |  Clojure High Performance Programming - Second Edition
Become an expert at writing fast and high performant code in Clojure 1.7.0
About This Book
-
Enhance code performance by using appropriate Clojure features
-
Improve the efficiency of applications and plan their deployment
-
A hands-on guide to designing Clojure programs to get...
|  |  Mastering Redmine
Redmine is an open source gem for project management, and this book shows you how to exploit its features to the max. Written as a practical tutorial, it's also the perfect reference guide to have by your side.
Overview
-
Use Redmine in the most effective manner and learn to master it.
- ...
|
|
|
 The Network Security Test Lab: A Step-by-Step Guide
The ultimate hands-on guide to IT security and proactivedefense
The Network Security Test Lab is a hands-on, step-by-stepguide to ultimate IT security implementation. Covering the fullcomplement of malware, viruses, and other attack technologies, thisessential guide walks you through the security assessment... |  |  Embedded SoPC Design with Nios II Processor and Verilog Examples
Explores the unique hardware programmability of FPGA-basedembedded systems, using a learn-by-doing approach to introduce theconcepts and techniques for embedded SoPC design with Verilog
An SoPC (system on a programmable chip) integrates a processor,memory modules, I/O peripherals, and custom hardware acceleratorsinto a single FPGA... |  |  Secure Your Node.js Web Application: Keep Attackers Out and Users Happy
Cyber-criminals have your web applications in their crosshairs. They search for and exploit common security mistakes in your web application to steal user data. Learn how you can secure your Node.js applications, database and web server to avoid these security holes. Discover the primary attack vectors against web applications, and implement... |
|
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |