With the advent of version 2 of the iPhone system, Apple proved they could do a remarkable thing — adapt their existing Cocoa computer application programming framework to make applications for a touch-based device with limited memory and speed and a dauntingly tiny display. The resulting Cocoa Touch framework, in...
As quantum theory enters its second century, it is fitting to examine just how far it has come as a tool for the chemist. Beginning with Max Planck’s agonizing conclusion in 1900 that linked energy emission in discreet bundles to the resultant black-body radiation curve, a body of knowledge has developed with profound consequences in...
Pro Android 4 shows you how to build real-world and fun mobile apps using the new Android SDK 4 (Ice Cream Sandwich), which unifies Gingerbread for smartphones, Honeycomb for tablets and augments further with Google TV and more.
This Android 4 book updates the best selling Pro Android 3 and covers everything...
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are...
IBM Cognos TM1 is one of the most popular multidimensional analysis tools used to build collaborative planning, budgeting, and forecasting solutions, as well as analytical and reporting applications. This cube-based technology does fast number crunching at the server end and helps end customers move away from manual and tedious planning,...
Computers play an increasingly important role in our society. A breakdown of all
computer systems would cause a breakdown of almost all activities of daily life.
Furthermore, personal computers are available in almost every home in the industrialized
world. But there is one sector where computers have a more strategic role, and
that...
This book addresses the fundamentals of communications systems and networks, providing
models and analytical methods for evaluating their performance. It is divided into ten chapters,
which are the result of a joint effort by the authors and contributors. The authors and the
contributors have a long history of collaboration, both in...
Agile methodologies attack risk at its core. To identify risk early and often is the
premise of agile security. Risk comes in many forms. Organizations face security
threats every day. Risks are in the delivery and maintenance of the countermeasures.
Agile IT Security focuses on the details of the steps in delivering and maintaining...
Information networking has emerged as a multidisciplinary diversified area of research over
the past few decades. From traditional wired telephony to cellular voice telephony and from
wired access to wireless access to the Internet, information networks have profoundly
impacted our lifestyle. At the time of writing, over 3 billion...
You may be wondering why we chose a photo of astronauts working
in space on the Space Station for the cover. We actually chose it for
several reasons. Obviously, it is very exciting; in fact, space represents
the most exciting frontier for the entire world! In addition, much of the
station itself consists of all kinds of circuits! One...
So you’ve decided to be a photographer. You studied photography in
college or went to art school, and you’ve come to the point of deciding
that it’s time to hang out your shingle. Or maybe you’re self-taught and
everyone loves your work and says, “Hey, you could make...
Android is hot, and many people are developing Android applications (apps for short).
Perhaps you would also like to develop apps, but are unsure about how to get started.
Although you could study Google’s online Android Developer’s Guide
(http://developer.android.com/guide/index.html) to acquire the needed knowledge,
you...