Home | Amazing | Today | Tags | Publishers | Years | Search 
iOS 4 in Action: Examples and Solutions for iPhone & iPad
iOS 4 in Action: Examples and Solutions for iPhone & iPad

When I started playing with the first-generation iPhone back in 2008, I was amazed by the simplicity and versatility of the smart phone. With the iPhone in hand, I could take pictures, navigate with GPS, tell time, and of course, play games—especially when I was bored while waiting in line at the DMV for my license plate....

Test-Driven Infrastructure with Chef
Test-Driven Infrastructure with Chef

Test-Driven Infrastructure with Chef demonstrates a radical approach to developing web infrastructure that combines the powerful Chef configuration management framework with Cucumber, the leading Behavior-driven development (BDD) tool. Learn how to deliver real business value by developing infrastructure code test-first.

...
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011). Each year DIMVA brings together international experts from academia, industry and government to present and discuss novel security research....

Pro Access 2010 Development
Pro Access 2010 Development

Microsoft Access is a unique platform that enables rapid development of database applications. It has been a long-time favorite of both developers and end users for creating single-user and small-scale office automation solutions. Recent improvements have made it a viable choice for enterprise-class applications as well. In this book,...

Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems
Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems

It is a great pleasure for me to write this foreword about a book that comes out of one of the first research projects funded by ANR, the French National Research Agency. ANR was established by the French government in 2005 to fund research projects, based on competitive schemes giving researchers the best opportunities to realize...

Computer Aided and Integrated Manufacturing Systems, Volume 4: Computer Aided Design / Computer Aided Manufacturing
Computer Aided and Integrated Manufacturing Systems, Volume 4: Computer Aided Design / Computer Aided Manufacturing

This 5 volume MRW (Major Reference Work) is entitled "Computer Aided and Integrated Manufacturing Systems". A brief summary description of each of the 5 volumes will be noted in their respective PREFACES. An MRW is normally on a broad subject of major importance on the international scene. Because of the breadth of a major...

The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

Boring, boring, boring. Isn’t this what immediately comes to mind when one sees books on foundational concepts of information security? Monotonous coverage of theory, dry details of history, brief yet inadequate coverage of every topic known to man, even though you know that you’ll never be hired by the NSA as a...

How Do Witches Fly? A practical approach to nocturnal flights.
How Do Witches Fly? A practical approach to nocturnal flights.

Books which examine the folklore of Europe's traditional "witch" plants are not uncommon, and some give some coverage to describing the psychotropic and hallucinogenic effects of these plants on the human body. However this book is rather more unusual than that in that the author is first and foremost a biochemist with an...

Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)
Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)

Information security has become a critical component in the stability and progress of the modern world. With high expectations from the public and stringent regulations from legislative and industry bodies, never have the pressures on corporations, governments and other organizations been so great to protect their own data as well as...

CompTIA Security+ SYO-201 Cert Guide
CompTIA Security+ SYO-201 Cert Guide

Welcome to the CompTIA Security+ SY0-201 Cert Guide. The CompTIA Security+ Certification is widely accepted as the first security certification you should attempt to attain in your information technology (IT) career. The CompTIA Security+ Certification is designed to be a vendor-neutral exam that measures your knowledge of...

ActionScript 3.0 Game Programming University (2nd Edition)
ActionScript 3.0 Game Programming University (2nd Edition)

When the first edition of ActionScript 3.0 Game Programming University came out, ActionScript 3.0 was new. It was so new, in fact, that most programmers were still stuck using older ActionScript 1.0 and 2.0.

But by now, most Flash developers have moved on to AS3, and they are loving the speed, reliability and logical...

Microsoft Windows Azure Development Cookbook
Microsoft Windows Azure Development Cookbook

The Windows Azure Platform is Microsoft's Platform-as-a-Service environment for hosting services and data in the cloud. It provides developers with on-demand compute, storage, and service connectivity capabilities that facilitate the hosting of highly-scalable services in Windows Azure datacenters across the globe.

This...

Result Page: 300 299 298 297 296 295 294 293 292 291 290 289 288 287 286 285 284 283 282 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy