Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning ARKit for iPhone and iPad: Augmented Reality App Development for iOS
Beginning ARKit for iPhone and iPad: Augmented Reality App Development for iOS

Explore how to use ARKit to create iOS apps and learn the basics of augmented reality while diving into ARKit specific topics. This book reveals how augmented reality allows you to view the screen on an iOS device, aim the camera at a nearby scene, and view both the real items in that scene as well as a graphic image overlaid on to...

The Design Thinking Playbook: Mindful Digital Transformation of Teams, Products, Services, Businesses and Ecosystems
The Design Thinking Playbook: Mindful Digital Transformation of Teams, Products, Services, Businesses and Ecosystems

A radical shift in perspective to transform your organization to become more innovative

The Design Thinking Playbook is an actionable guide to the future of business. By stepping back and questioning the current mindset, the faults of the status quo stand out in stark relief—and this guide gives you the tools...

Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)
Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)

## ## ## The Ultimate Guide to the 17 Most Dangerous Hacking Attacks ## ## ##

Do you want to learn about today's most sophisticated Hacking attacks?

Do you want to know more about Cyber criminals and their operations?

Do you want to learn about Robot Networks, Trojans &
...

Cracking Codes with Python: An Introduction to Building and Breaking Ciphers
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers

Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! 

After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère
...

Essential Algorithms: A Practical Approach to Computer Algorithms
Essential Algorithms: A Practical Approach to Computer Algorithms

A friendly and accessible introduction to the most useful algorithms

Computer algorithms are the basic recipes for programming. Professional programmers need to know how to use algorithms to solve difficult programming problems. Written in simple, intuitive English, this book describes how and when to use the most practical...

Migrating to IPv6: A Practical Guide to Implementing IPv6 in Mobile and Fixed Networks
Migrating to IPv6: A Practical Guide to Implementing IPv6 in Mobile and Fixed Networks
Exhaustion of address space and global routing table growth necessitate important revisions to the current version of the Internet Protocol, IPv4. IP version 6 offers greater address space and additional features to support the evolving requirements of Internet applications. Deployed alongside current IPv4 networks, IPv6 will restore the...
Linear Systems Control: Deterministic and Stochastic Methods
Linear Systems Control: Deterministic and Stochastic Methods
Control engineering is a multidisciplinary subject which is critical to the operation of modern technology and which is nearly invisible in daily life. From atomic force microscopes, through PC disk drives and drive-by-wire engine controls to Boeing 747’s and to space shuttles, multivariable controls underlie many of a the devices which are...
Migrating Applications to IPv6
Migrating Applications to IPv6

How badly will IPv6 break your application? What do you need to consider to make your application “IPv6-ready”? What questions should you ask?

In the ideal world, your application should “just work” on IPv6, just as it does on IPv4. However, in the real world, application issues crop up. These could be...

Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

The Next Wave: Using Digital Technology to Further Social and Political Innovation (Brookings FOCUS Book)
The Next Wave: Using Digital Technology to Further Social and Political Innovation (Brookings FOCUS Book)

The digital revolution is in full force but many public and private sector leaders are stymied: How can they maximize the full potential of digital technology? This hesitancy puts a brake on the transformational power of digital technology and means private companies and governmental bodies fall well behind other digital pioneers....

CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
All-in-One is All You Need

Fully revised for the latest exam release, this authoritative volume offers thorough coverage of all the material on the Certified Information Systems Security Professional (CISSP) exam. Written by a renowned security expert and CISSP, this guide features complete details on all 10 exam domains...

Physics for Game Developers: Science, math, and code for realistic effects
Physics for Game Developers: Science, math, and code for realistic effects

If you want to enrich your game’s experience with physics-based realism, the expanded edition of this classic book details physics principles applicable to game development. You’ll learn about collisions, explosions, sound, projectiles, and other effects used in games on Wii, PlayStation, Xbox, smartphones, and tablets....

Result Page: 44 43 42 41 40 39 38 37 36 35 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy