Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Sencha Touch in Action
Sencha Touch in Action

Summary

Sencha Touch in Action is the definitive guide to developing applications with Sencha Touch. You'll begin with basic design principles for building great mobile applications, and then explore the features of Sencha Touch that bring those ideas to life. You'll learn how and why objects...

ASP.NET Core 2 Fundamentals: Build cross-platform apps and dynamic web services with this server-side web application framework
ASP.NET Core 2 Fundamentals: Build cross-platform apps and dynamic web services with this server-side web application framework

Imagine the boost in business if you can build large, rich web applications with little code and built-in Windows authentication. With this book, you can gain skills to develop real-world applications with ASP.NET Core 2.

Key Features

  • Adopts the application-centric approach to explain core...
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Learn TensorFlow 2.0: Implement Machine Learning and Deep Learning Models with Python
Learn TensorFlow 2.0: Implement Machine Learning and Deep Learning Models with Python
Learn how to use TensorFlow 2.0 to build machine learning and deep learning models with complete examples. 

The book begins with introducing TensorFlow 2.0 framework and the major changes from its last release. Next, it focuses on building Supervised Machine Learning models using TensorFlow 2.0.
...
The Tao of Network Security Monitoring : Beyond Intrusion Detection
The Tao of Network Security Monitoring : Beyond Intrusion Detection

Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen?

...
Java and XML
Java and XML
Two hot topics come together in this developer's guide from Brett McLaughlin, Java and XML. Both Java and XML are cross-platform technologies; by using Java for code and XML for transporting data, you can build truly portable applications. This title is aimed at intermediate to advanced programmers; while XML topics are explained more or...
Programming Windows Presentation Foundation
Programming Windows Presentation Foundation

Windows Presentation Foundation (WPF) (formerly known by its code name "Avalon") is a brand-new presentation framework for Windows XP and Windows Vista, the next version of the Windows client operating system. For developers, WPF is a cornucopia of new technologies, including a new graphics engine that supports 3-D...

Counting the Public In
Counting the Public In
"A major scholarly work that adds greatly to our knowledge of the linkages between general public opinion and foreign policy." -- American Political Science Review

Ralph Levering Department of History, Davidson College, and author of The Public and American Foreign Policy, 1918-1978
...
Humane Interfaces (Human Factors in Information Technology)
Humane Interfaces (Human Factors in Information Technology)
Ever since the first successful International Cognitive Technology (CT) Conference in Hong Kong in August 1995, a growing concern about the dehumanising potential of machines, and the machining potential of the human mind, has pervaded the organisers' thinking. When setting up the agenda for the Second International CT Conference in Aizu, Japan, in...
Unlocking Android
Unlocking Android
Android is a free, open source, Java-based mobile platform developed by Google. Unlocking Android prepares the reader to embrace the Android mobile platform in easy-to-understand language and builds on this foundation with reusable Java code examples. It's ideal for corporate developers and hobbyists who have an interest, or a mandate, to...
Trading from Your Gut: How to Use Right Brain Instinct & Left Brain Smarts to Become a Master Trader
Trading from Your Gut: How to Use Right Brain Instinct & Left Brain Smarts to Become a Master Trader

EARN SERIOUS TRADING PROFITS BY USING YOUR WHOLE BRAIN!

 

Legendary traders like Jesse Livermore, George Soros, Richard Dennis, and Steven Cohen use their full range of powers that encompass both instinct and analysis. That’s how they made...

Professional Flash Lite Mobile Development (Wrox Programmer to Programmer)
Professional Flash Lite Mobile Development (Wrox Programmer to Programmer)

Discover how to create Flash Lite mobile apps from the ground up

Adobe Flash is an ideal choice for developing rich interactive content for "Flash-enabled" mobile devices; and with this book, you'll learn how to create unique applications with Flash Lite. Through a series of code samples and extensive example...

unlimited object storage image
Result Page: 265 264 263 262 261 260 259 258 257 256 255 254 253 252 251 250 249 248 247 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy